Powered by Deep Web Technologies
Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: EMC Smarts Network Configuration Manager Database 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: EMC Identifier: ESA-2012-057 Secunia Advisory SA51408 SecurityTracker Alert ID: 1027812 CVE-2012-4614 CVE-2012-4615 IMPACT ASSESSMENT: Medium DISCUSSION: The systems uses a hard-coded key to encrypt authentication credentials on the target system [CVE-2012-4615]. A local user with knowledge of the key

2

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

3

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

4

U-268: Oracle Database Authentication Protocol Discloses Session...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bug Lets Remote Authenticated Users Gain Elevated Privileges V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-535: Oracle Critical Patch Update -...

5

T-659: Update support for RSA Authentication Manager | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager July 1, 2011 - 7:15am Addthis PROBLEM: Authentication Manager SP4 Patch 4 Windows Server 2008 PLATFORM: Windows Server 2008 SP4 Patch 4 32bit & 64bit (architectures)...

6

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

7

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

8

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

9

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Authentication Manager Writes Operating System, SNMP, 4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files June 10, 2013 - 12:47am Addthis PROBLEM: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: RSA SecurityTracker Alert ID: 1028638 CVE-2013-0947 IMPACT ASSESSMENT: Medium DISCUSSION: The system may write operating system, SNMP, and HTTP plug-in proxy passwords in clear text to log and configuration files. IMPACT: A local user can obtain operating system, SNMP, and HTTP plug-in proxy

10

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

11

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

12

Methodical Construction of Database Management Systems  

E-Print Network (OSTI)

Although more and more database management systems are being developed, constructing such systems in an engineering fashion remains an open problem. An engineering attitude towards construction not only tells how to implement a database management system, but also tries to minimize construction time. Hence, the prime objective of an engineering-style construction approach is construction efficiency.

Andreas Geppert; Erlangung Der; Philosophischen Doktorwrde; Vorgelegt Der; Begutachtet Von; Den Herren; K. R. Dittrich; K. Bauknecht; Prof Dr; Prof Dr; Prof Dr; M. Glinz

1994-01-01T23:59:59.000Z

13

EERE Project Management Center Database PIA, The Office of Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management Center Database PIA, The Office of Energy Efficiency and Renewable Energy (EERE) EERE Project Management Center Database PIA, The Office of Energy Efficiency and...

14

Nuclear Asset Management Database: Phase 2: Prototype Long-term Asset Management Database (LAMDA)  

Science Conference Proceedings (OSTI)

EPRI members engaged in nuclear asset management (NAM) and life cycle management (LCM) view quality equipment reliability and cost data as one of the highest priority needs in a market-driven industry, but less data are available for equipment important to generation than for safety equipment addressed in probabilistic risk assessment (PRA). This interim report describes the second phase of development of the Long-term Asset Management Database (LAMDA).

2004-12-21T23:59:59.000Z

15

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager (NCM) database CVE-2012-4614. Impact: A remote user can connect to the target database. A local user can obtain passwords. Solution: The vendor has issued a fix (9.1)....

16

NGNP Risk Management Database: A Model for Managing Risk  

Science Conference Proceedings (OSTI)

The Next Generation Nuclear Plant (NGNP) Risk Management System (RMS) is a database used to maintain the project risk register. The RMS also maps risk reduction activities to specific identified risks. Further functionality of the RMS includes mapping reactor suppliers Design Data Needs (DDNs) to risk reduction tasks and mapping Phenomena Identification Ranking Table (PIRTs) to associated risks. This document outlines the basic instructions on how to use the RMS. This document constitutes Revision 1 of the NGNP Risk Management Database: A Model for Managing Risk. It incorporates the latest enhancements to the RMS. The enhancements include six new custom views of risk data - Impact/Consequence, Tasks by Project Phase, Tasks by Status, Tasks by Project Phase/Status, Tasks by Impact/WBS, and Tasks by Phase/Impact/WBS.

John Collins; John M. Beck

2011-11-01T23:59:59.000Z

17

NGNP Risk Management Database: A Model for Managing Risk  

Science Conference Proceedings (OSTI)

To facilitate the implementation of the Risk Management Plan, the Next Generation Nuclear Plant (NGNP) Project has developed and employed an analytical software tool called the NGNP Risk Management System (RMS). A relational database developed in Microsoft® Access, the RMS provides conventional database utility including data maintenance, archiving, configuration control, and query ability. Additionally, the tool’s design provides a number of unique capabilities specifically designed to facilitate the development and execution of activities outlined in the Risk Management Plan. Specifically, the RMS provides the capability to establish the risk baseline, document and analyze the risk reduction plan, track the current risk reduction status, organize risks by reference configuration system, subsystem, and component (SSC) and Area, and increase the level of NGNP decision making.

John Collins

2009-09-01T23:59:59.000Z

18

Modeling and managing changes in text databases  

Science Conference Proceedings (OSTI)

Large amounts of (often valuable) information are stored in web-accessible text databases. “Metasearchers” provide unified interfaces to query multiple such databases at once. For efficiency, metasearchers rely on succinct statistical summaries ... Keywords: Metasearching, distributed information retrieval, text database selection

Panagiotis G. Ipeirotis; Alexandros Ntoulas; Junghoo Cho; Luis Gravano

2007-08-01T23:59:59.000Z

19

Software Metrics Knowledge and Databases for Project Management  

Science Conference Proceedings (OSTI)

AbstractżConstruction and maintenance of large, high-quality software projects is a complex, error-prone, and difficult process. Tools employing software database metrics can play an important role in efficient execution and management of such large ... Keywords: Knowledge-based tools for software project management, efficiency and robustness in large-scale software development, knowledge abstraction from raw data, software metrics databases, test and evaluation, cost-effective project management.

Raymond A. Paul; Tosiyasu L. Kunii; Yoshihisa Shinagawa; Muhammad F. Khan

1999-01-01T23:59:59.000Z

20

Supporting match joins in relational database management systems  

Science Conference Proceedings (OSTI)

As more and more diverse applications seek to use database management systems (DBMS) as their primary storage, the question frequently arises as to whether we can exploit the query capabilities of the DBMS to support these applications. This dissertation ...

Ameet M. Kini / Jeffrey F. Naughton

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Managing database technology at enterprise scale  

Science Conference Proceedings (OSTI)

Paul Yaron is responsible for Non-Mainframe, Relational Database Architecture, Engineering and Strategy for JPMC globally. JP Morgan is a leading financial services firm with assets over $2 trillion, operates 40 major datacenters around the globe, servicing ... Keywords: big data, integration, security

Paul Yaron

2013-06-01T23:59:59.000Z

22

DOE technology information management system database study report  

SciTech Connect

To support the missions of the US Department of Energy (DOE) Special Technologies Program, Argonne National Laboratory is defining the requirements for an automated software system that will search electronic databases on technology. This report examines the work done and results to date. Argonne studied existing commercial and government sources of technology databases in five general areas: on-line services, patent database sources, government sources, aerospace technology sources, and general technology sources. First, it conducted a preliminary investigation of these sources to obtain information on the content, cost, frequency of updates, and other aspects of their databases. The Laboratory then performed detailed examinations of at least one source in each area. On this basis, Argonne recommended which databases should be incorporated in DOE`s Technology Information Management System.

Widing, M.A.; Blodgett, D.W.; Braun, M.D.; Jusko, M.J.; Keisler, J.M.; Love, R.J.; Robinson, G.L. [Argonne National Lab., IL (United States). Decision and Information Sciences Div.

1994-11-01T23:59:59.000Z

23

Evaluation of PC-Based Eddy Current Database Management Program  

Science Conference Proceedings (OSTI)

Part of the Balance-of-Plant (BOP) Heat Exchanger Condition Assessment Program for 1998 was an evaluation of commercially available PC-based eddy current database management software programs. The objective of the study was to evaluate the selected software programs for general user-friendliness, ease of tubesheet creation, inspection planning, query building and execution, printing options, import and export capabilities, documentation, network features, technical support, and product cost. Three (3) so...

1998-12-18T23:59:59.000Z

24

Software configuration management plan for the Hanford site technical database  

Science Conference Proceedings (OSTI)

The Hanford Site Technical Database (HSTD) is used as the repository/source for the technical requirements baseline and programmatic data input via the Hanford Site and major Hanford Project Systems Engineering (SE) activities. The Hanford Site SE effort has created an integrated technical baseline for the Hanford Site that supports SE processes at the Site and project levels which is captured in the HSTD. The HSTD has been implemented in Ascent Logic Corporation (ALC) Commercial Off-The-Shelf (COTS) package referred to as the Requirements Driven Design (RDD) software. This Software Configuration Management Plan (SCMP) provides a process and means to control and manage software upgrades to the HSTD system.

GRAVES, N.J.

1999-05-10T23:59:59.000Z

25

The Oil and Natural Gas Knowledge Management Database from NETL  

DOE Data Explorer (OSTI)

The Knowledge Management Database (KMD) Portal provides four options for searching the documents and data that NETL-managed oil and gas research has produced over the years for DOE’s Office of Fossil Energy. Information includes R&D carried out under both historical and ongoing DOE oil and gas research and development (R&D). The Document Repository, the CD/DVD Library, the Project Summaries from 1990 to the present, and the Oil and Natural Gas Program Reference Shelf provide a wide range of flexibility and coverage.

26

Future Robotics Database Management System along with Cloud TPS  

E-Print Network (OSTI)

This paper deals with memory management issues of robotics. In our proposal we break one of the major issues in creating humanoid. . Database issue is the complicated thing in robotics schema design here in our proposal we suggest new concept called NOSQL database for the effective data retrieval, so that the humanoid robots will get the massive thinking ability in searching each items using chained instructions. For query transactions in robotics we need an effective consistency transactions so by using latest technology called CloudTPS which guarantees full ACID properties so that the robot can make their queries using multi-item transactions through this we obtain data consistency in data retrievals. In addition we included map reduce concepts it can splits the job to the respective workers so that it can process the data in a parallel way.

S, Vijaykumar

2011-01-01T23:59:59.000Z

27

T-614: Cisco Unified Communications Manager Database Security Vulnerability  

Energy.gov (U.S. Department of Energy (DOE))

The vulnerability is due to unspecified errors in the affected software that may allow the attacker to perform SQL injections. An authenticated, remote attacker could inject arbitrary SQL code on the system, allowing the attacker to take unauthorized actions.

28

Plan for a Nuclear Power Industry Life Cycle Management and Nuclear Asset Management Database  

Science Conference Proceedings (OSTI)

The database development plan in this report is the first phase of providing plants with a useful computerized compendium of existing worldwide equipment reliability, aging, and other life cycle management (LCM) and nuclear asset management (NAM) data for risk-based nuclear asset and project evaluation.

2003-05-30T23:59:59.000Z

29

NIST Special Publication Expands Government Authentication ...  

Science Conference Proceedings (OSTI)

... The Office of Management and Budget's guidance, “E-Authentication Guidance for Federal Agencies” [OMB 04-04] can be found at www ...

2011-12-20T23:59:59.000Z

30

Modeling and Managing Content Changes in Text Databases  

Science Conference Proceedings (OSTI)

Large amounts of (often valuable) information are stored in web-accessible text databases. "Metasearchers" provide unified interfaces to query multiple such databases at once. For efficiency, metasearchers rely on succinct statistical summaries of the ...

Panagiotis G. Ipeirotis; Alexandros Ntoulas; Junghoo Cho; Luis Gravano

2005-04-01T23:59:59.000Z

31

Proposal to negotiate the renewal of the contract for the licensing and maintenance of database management system software  

E-Print Network (OSTI)

Proposal to negotiate the renewal of the contract for the licensing and maintenance of database management system software

2008-01-01T23:59:59.000Z

32

Microsoft PowerPoint - G4-Knowledge Management Database (KMD) Demonstration[1].ppt  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Knowledge Management Database Knowledge Management Database (KMD) Demonstration Rand Batchelder, Chris Wyatt, Dale Cunningham September 15 & 16, 2009 2 2 KMD Demonstration Overview * The Federal Advisory Committee Recommended That ORD Develop A Knowledge Management Database That Would Be Used As A Repository for Research and Development Results Related to the Section 999 R&D Program Including: - Program Status * A list of projects goals, objectives, status, accomplishments, reports and key personnel contact information - The RPSEA Consortium R&D Program * 57 project summaries currently available on the NETL Internet - NETL Complimentary R&D Program * Drilling under extreme conditions * Environmental impacts of oil and natural gas development * Enhanced and unconventional oil recovery

33

System Models for Goal-Driven Self-management in Autonomic Databases  

Science Conference Proceedings (OSTI)

Self-managing databases intend to reduce the total cost of ownership for a DBS by automatically adapting the DBS configuration to evolving workloads and environments. However, existing techniques strictly focus on automating one particular administration ...

Marc Holze; Norbert Ritter

2009-10-01T23:59:59.000Z

34

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and JBOSS. Addthis Related Articles V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control U-247: EMC Cloud Tiering...

35

Towards a hybrid row-column database for a cloud-based medical data management system  

Science Conference Proceedings (OSTI)

Medical data management becomes a real exigency. The emergence of new medical imaging techniques and the necessity to access medical information at any time have led to an inevitable need to find new advanced solutions for managing these critical data. ... Keywords: DICOM, cloud computing, hybrid database, medical imaging

Baraa Mohamad; Laurent d'Orazio; Le Gruenwald

2012-08-01T23:59:59.000Z

36

Generic Natural Systems Evaluation - Thermodynamic Database Development and Data Management  

DOE Green Energy (OSTI)

Thermodynamic data are essential for understanding and evaluating geochemical processes, as by speciation-solubility calculations, reaction-path modeling, or reactive transport simulation. These data are required to evaluate both equilibrium states and the kinetic approach to such states (via the affinity term or its equivalent in commonly used rate laws). These types of calculations and the data needed to carry them out are a central feature of geochemistry in many applications, including water-rock interactions in natural systems at low and high temperatures. Such calculations are also made in engineering studies, for example studies of interactions involving man-made materials such as metal alloys and concrete. They are used in a fairly broad spectrum of repository studies where interactions take place among water, rock, and man-made materials (e.g., usage on YMP and WIPP). Waste form degradation, engineered barrier system performance, and near-field and far-field transport typically incorporate some level of thermodynamic modeling, requiring the relevant supporting data. Typical applications of thermodynamic modeling involve calculations of aqueous speciation (which is of great importance in the case of most radionuclides), solubilities of minerals and related solids, solubilities of gases, and stability relations among the various possible phases that might be present in a chemical system at a given temperature and pressure. If a phase can have a variable chemical composition, then a common calculational task is to determine that composition. Thermodynamic modeling also encompasses ion exchange and surface complexation processes. Any and all of these processes may be important in a geochemical process or reactive transport calculation. Such calculations are generally carried out using computer codes. For geochemical modeling calculations, codes such as EQ3/6 and PHREEQC, are commonly used. These codes typically provide 'full service' geochemistry, meaning that they use a large body of thermodynamic data, generally from a supporting database file, to sort out the various important reactions from a wide spectrum of possibilities, given specified inputs. Usually codes of this kind are used to construct models of initial aqueous solutions that represent initial conditions for some process, although sometimes these calculations also represent a desired end point. Such a calculation might be used to determine the major chemical species of a dissolved component, the solubility of a mineral or mineral-like solid, or to quantify deviation from equilibrium in the form of saturation indices. Reactive transport codes such as TOUGHREACT and NUFT generally require the user to determine which chemical species and reactions are important, and to provide the requisite set of information including thermodynamic data in an input file. Usually this information is abstracted from the output of a geochemical modeling code and its supporting thermodynamic data file. The Yucca Mountain Project (YMP) developed two qualified thermodynamic databases to model geochemical processes, including ones involving repository components such as spent fuel. The first of the two (BSC, 2007a) was for systems containing dilute aqueous solutions only, the other (BSC, 2007b) for systems involving concentrated aqueous solutions and incorporating a model for such based on Pitzer's (1991) equations. A 25 C-only database with similarities to the latter was also developed for the Waste Isolation Pilot Plant (WIPP, cf. Xiong, 2005). The NAGRA/PSI database (Hummel et al., 2002) was developed to support repository studies in Europe. The YMP databases are often used in non-repository studies, including studies of geothermal systems (e.g., Wolery and Carroll, 2010) and CO2 sequestration (e.g., Aines et al., 2011).

Wolery, T W; Sutton, M

2011-09-19T23:59:59.000Z

37

Development of Energy Consumption Database Management System of Existing Large Public Buildings  

E-Print Network (OSTI)

The statistic data of energy consumption are the base of analyzing energy consumption. The scientific management method of energy consumption data and the development of database management system plays an important role in building energy conservation. At present, the large public buildings have been the emphasis of building energy conservation in China. The functions and the basic construction of energy consumption database management system (ECDBMS) for large public buildings are introduced. The ECDBMS is developed by using SQL Server 2000 as the database and PowerBuilder10.0 as the developing tool. It includes five parts such as the basic information of public buildings, the designing parameters of energy-consuming equipments, the operational parameters of energy-consuming equipments, the electric and fuel consumption of buildings, the evaluation of energy efficiency for equipments. The energy consumption database can be accumulated and some functions can be realized by using this database such as the management of building designing parameters and energy consumption data, the evaluation and analysis of building energy consumption.

Li, Y.; Zhang, J.; Sun, D.

2006-01-01T23:59:59.000Z

38

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the target system. A remote authenticated user can execute SQL commands on the underlying database. A remote user can spoof connections in certain cases. Solution: The vendor has...

39

U-dbms: a database system for managing constantly-evolving data  

E-Print Network (OSTI)

In many systems, sensors are used to acquire information from external environments such as temperature, pressure and locations. Due to continuous changes in these values, and limited resources (e.g., network bandwidth and battery power), it is often infeasible for the database to store the exact values at all times. Queries that uses these old values can produce invalid results. In order to manage the uncertainty between the actual sensor value and the database value, we propose a system called U-DBMS. U-DBMS extends the database system with uncertainty management functionalities. In particular, each data value is represented as an interval and a probability distribution function, and it can be processed with probabilistic query operators to produce imprecise (but correct) answers. This demonstration presents a PostgreSQL-based system that handles uncertainty and probabilistic queries for constantly-evolving data. 1

Reynold Cheng; Sarvjeet Singh; Sunil Prabhakar

2005-01-01T23:59:59.000Z

40

Authentication of byte sequences  

SciTech Connect

Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

Stearns, S.D.

1991-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Comprehensive online Atomic Database Management System (DBMS) with Highly Qualified Computing Capabilities  

E-Print Network (OSTI)

The intensive need of atomic data is expanding continuously in a wide variety of applications (e.g. fusion energy and astrophysics, laser-produced, plasma researches, and plasma processing).This paper will introduce our ongoing research work to build a comprehensive, complete, up-to-date, user friendly and online atomic Database Management System (DBMS) namely called AIMS by using SQLite (http://www.sqlite.org/about.html)(8). Programming language tools and techniques will not be covered here. The system allows the generation of various atomic data based on professional online atomic calculators. The ongoing work is a step forward to bring detailed atomic model accessible to a wide community of laboratory and astrophysical plasma diagnostics. AIMS is a professional worldwide tool for supporting several educational purposes and can be considered as a complementary database of IAEA atomic databases. Moreover, it will be an exceptional strategy of incorporating the output data of several atomic codes to external ...

Tahat, Amani

2011-01-01T23:59:59.000Z

42

A Prescribed Fire Emission Factors Database for Land Management and Air Quality Applications  

Science Conference Proceedings (OSTI)

The Clean Air Act, its amendments, and air quality regulations require that prescribed fire managers estimate the quantity of emissions that a prescribed fire will produce. Information on emissions is available for these calculations; however, it is often incomplete or difficult to find. Tables and computer models can also provide some of this information, but the quality and applicability of the data to a specific site are unknown. In conjunction with three research projects developing new emissions data and meteorological tools to assist prescribed fire managers, the Resource Conservation and Climate Change Program Area of the Department of Defense's Strategic Environmental Research and Development Program is supporting development of a database that contains emissions information related to prescribed burning. Ultimately the vetted database will be available on the Internet and will contain emissions information that has been developed from laboratory and field-scale measurements and has been published.

Lincoln, Emily; Hao, WeiMin; Baker, S.; Yokelson, Robert J.; Burling, Ian R.; Urbanski, Shawn; Miller, J. Wayne; Weise, David; Johnson, Timothy J.

2010-12-20T23:59:59.000Z

43

Industry-Wide Database for Power Transformers: Decision Support for Substation Asset Management  

Science Conference Proceedings (OSTI)

Asset managers need meaningful, defensible metrics to understand the implications of aging transformers and make informed decisions regarding maintenance, repair, and replacement of these high-dollar assets. To ensure that these meaningful metrics are established using the best available data, EPRI is developing an Industry-Wide Database (IDB) for power transformers.The IDB is a repository of detailed performance data on transformers pooled from supporting utilities. The IDB captures ...

2012-12-20T23:59:59.000Z

44

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

45

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

46

Object-Oriented Database for Managing Building Modeling Components and Metadata: Preprint  

SciTech Connect

Building simulation enables users to explore and evaluate multiple building designs. When tools for optimization, parametrics, and uncertainty analysis are combined with analysis engines, the sheer number of discrete simulation datasets makes it difficult to keep track of the inputs. The integrity of the input data is critical to designers, engineers, and researchers for code compliance, validation, and building commissioning long after the simulations are finished. This paper discusses an application that stores inputs needed for building energy modeling in a searchable, indexable, flexible, and scalable database to help address the problem of managing simulation input data.

Long, N.; Fleming, K.; Brackney, L.

2011-12-01T23:59:59.000Z

47

Information flow in the DAMA Project beyond database managers: Information flow managers  

Science Conference Proceedings (OSTI)

To meet the demands of commercial data traffic on the information highway, a new look at managing data is necessary. One projected activity, sharing of point-of-sale information, is being considered in the Demand Activated Manufacturing Project of the American Textile Partnership project. A scenario is examined in which 100,000 retail outlets communicate over a period of days. They provide the latest estimate of demand for sewn products across a chain of 26,000 suppliers through the use of bill-of-materials explosions at four levels of detail. A new paradign the information flow manager, is developed to handle this situation, including the case where members of the supply chain fail to communicate and go out of business. Techniques for approximation are introduced to keep estimates of demand as current as possible.

Russell, L. [Argonne National Lab., IL (United States); Wolfson, O.; Yu, C. [Illinois Univ., Chicago, IL (United States)

1996-03-01T23:59:59.000Z

48

The AMI Database Project: Atlas Data Challenge Bookkeeping, and the Tag Collector, a new tool for Release Management  

E-Print Network (OSTI)

Many database tools have the same or similar requirements. The Atlas Metadata Interface (AMI) project aims to provide a set of generic tools for managing database applications. AMI has a three-tier architecture with a core that supports a connection to any RDBMS using JDBC and SQL. The middle layer assumes that the databases have an AMI compliant self-describing structure. It provides a generic web interface and a generic command line interface. The top layer contains application specific features. Currently 7 such applications exist. Two of these applications are described. The first, and principal use of AMI, is the Atlas Data Challenge Production Bookkeeping interface. The second application is called Tag Collector, a web tool for release management, has many features which have greatly facilitated Atlas software management.

Solveig Albrand; Johann Collot; Jerome Fulachier

2003-04-23T23:59:59.000Z

49

Towards practical anonymous password authentication  

Science Conference Proceedings (OSTI)

The conventional approach for anonymous password authentication incurs O(N) server computation, linear to the total number of users. In ACSAC'09, Yang et al. proposed a new approach for anonymous password authentication, breaking this lower ... Keywords: anonymity, guessing attack, password authentication

Yanjiang Yang; Jianying Zhou; Jun Wen Wong; Feng Bao

2010-12-01T23:59:59.000Z

50

Digital Image Authentication: A Review  

Science Conference Proceedings (OSTI)

Digital image authentication refers to all the techniques performing anti-falsification, digital image copyright protection, or access control. A large number of DIA techniques have been developed to authenticate digital images, including cryptography-based ... Keywords: Data Hiding, Digital Fingerprints, Forensic Science, Image Authentication, Watermarking

Chia-Hung Wei; Yue Li

2011-04-01T23:59:59.000Z

51

The use of video within a database management system: the creation of an integrated information system for National Hockey League (NHL) teams  

Science Conference Proceedings (OSTI)

In this paper, the use of a statistical and video electronic database by two NHL teams is discussed. We begin with an illustration of the type of information commonly recorded on hockey players. The research and development of new video and computer ... Keywords: DMS), HNL), National Hockey League (, database management system (, integrated information systems, video database system

Kevin J. Leonard

2002-07-01T23:59:59.000Z

52

DSM (demand-side management) commercial customer acceptance: Volume 2, Survey and database documentation: Final report. [Demand-side management  

SciTech Connect

A survey was conducted among utility DSM (demand-side management) program managers to gather information on the characteristics of commercial sector programs. The survey data were used in part to identify the important factors that influence customer participation in such programs. Information was gathered in the following general areas of interest: (1) program characteristics (e.g., program type, objectives, status, etc.); (2) marketing characteristics (e.g., promotional mechanisms, budget, goals, etc.); (3) customer eligibility and participation (e.g., characteristics of the eligible population, participation by customer category, etc.); and (4) market research information (e.g., the data that pertain to the effectiveness of the progress). The survey obtained information on 108 DSM programs covering a broad range of options, including audits, non-audit information, financial incentive, direct load control, distributed local control, thermal energy storage, time-of-use rates, and other rate programs. Program planners can use the survey database, presented in its entirety in this report, to identify utilities that have already implemented DSM programs of interest and to learn from their experience.

George, S.S.; Kirksey, W.E.; Skelton, J.C.

1988-04-01T23:59:59.000Z

53

T-703: Cisco Unified Communications Manager Open Query Interface Lets  

NLE Websites -- All DOE Office Websites (Extended Search)

703: Cisco Unified Communications Manager Open Query Interface 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5 ABSTRACT: A remote user can obtain database contents, including authentication credentials. reference LINKS: SecurityTracker Alert ID: 1025971 Cisco Document ID: 113190 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents. A remote user can access an open

54

CERTIFICATE OF AUTHENTICITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair Michael G. Mueller presiding. ATTENDEES: MIKE MUELLER, Arneren Energy Fuels & Services Company, Chair RICH EIMER, Dynegy Inc., Vice-Chair ROBERT BECK, National Coal Council, Executive Vice-President SY ALI, Clean Energy Consulting BARB ALTIZER, Eastern Coal Council

55

CHALLENGE MEASUREMENTS FOR AUTHENTICATION  

Science Conference Proceedings (OSTI)

Authentication of systems with an information barrier that protects sensitive information is difficult; in particular, the information barrier can allow a hidden switch to be implemented by the system fabricator and operator. The hidden switch is the operator’s ability to subvert the measurement system and force it to produce a desired and false result. It is usually discussed in the context of an attribute measurement in which a faked item is presented in place of a real item regulated by an agreement, with the driving motivation being the ability to preserve a stock of valuable items. In simple terms, the hidden switch enables a shell game with assets, and the information barrier protects the switch. This presentation outlines challenge measurements that could be used to detect the implementation of a hidden switch and assist the authentication process.

Pitts, W. Karl

2009-10-07T23:59:59.000Z

56

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not remotely exploitable without authentication, i.e., may...

57

Byzantine agreement method without authentication  

SciTech Connect

This invention relates to a method for achieving Byzantine agreement without authentication among n 100 communicating processors using event counting and thresholding rather than message exchanges and evaluations.

Reischuk, R.K.

1983-12-01T23:59:59.000Z

58

Lachesis: robust database storage management based on device-specific performance characteristics  

Science Conference Proceedings (OSTI)

Database systems work hard to tune I/O performance, but do not always achieve the full performance potential of modern disk systems. Their abstracted view of storage components hides useful device-specific characteristics, such as disk track boundaries ...

Jiri Schindler; Anastassia Ailamaki; Gregory R. Ganger

2003-09-01T23:59:59.000Z

59

Requirements for signaling channel authentication  

SciTech Connect

This contribution addresses requirements for ATM signaling channel authentication. Signaling channel authentication is an ATM security service that binds an ATM signaling message to its source. By creating this binding, the message recipient, and even a third party, can confidently verify that the message originated from its claimed source. This provides a useful mechanism to mitigate a number of threats. For example, a denial of service attack which attempts to tear-down an active connection by surreptitiously injecting RELEASE or DROP PARTY messages could be easily thwarted when authenticity assurances are in place for the signaling channel. Signaling channel authentication could also be used to provide the required auditing information for accurate billing which is impervious to repudiation. Finally, depending on the signaling channel authentication mechanism, end-to-end integrity of the message (or at least part of it) can be provided. None of these capabilities exist in the current specifications.

Tarman, T.D.

1995-12-11T23:59:59.000Z

60

Online reorganization of databases  

Science Conference Proceedings (OSTI)

In practice, any database management system sometimes needs reorganization, that is, a change in some aspect of the logical and/or physical arrangement of a database. In traditional practice, many types of reorganization have required denying access ... Keywords: Clustering, concurrent reorganization, indexes, log-structured file systems, maintenance, online reorganization, redefinition, reorganization, restructuring, schema evolution, very large databases

Gary H. Sockut; Balakrishna R. Iyer

2009-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

COMPILATION AND MANAGEMENT OF ORP GLASS FORMULATION DATABASE, VSL-12R2470-1 REV 0  

SciTech Connect

The present report describes the first steps in the development of a glass property-composition database for WTP LAW and HL W glasses that includes all of the data that were used in the development of the WTP baseline models and all of the data collected subsequently as part of WTP enhancement studies perfonned for ORP. The data were reviewed to identifY some of the more significant gaps in the composition space that will need to be filled to support waste processing at Hanford. The WTP baseline models have been evaluated against the new data in terms of range of validity and prediction perfonnance.

Kruger, Albert A. [Department of Energy, Office of River Protection, Richland, Washington (United States); Pasieka, Holly K. [The Catholic University of America, Washington, DC (United States); Muller, Isabelle [The Catholic University of America, Washington, DC (United States); Gilbo, Konstantin [The Catholic University of America, Washington, DC (United States); Perez-Cardenas, Fernando [The Catholic University of America, Washington, DC (United States); Joseph, Innocent [The Catholic University of America, Washington, DC (United States); Pegg, Ian L. [The Catholic University of America, Washington, DC (United States); Kot, Wing K. [The Catholic University of America, Washington, DC (United States)

2012-12-13T23:59:59.000Z

62

Mobile IP Authentication, Authorization, and Accounting Requirements  

Science Conference Proceedings (OSTI)

The Mobile IP and Authentication, Authorization, Accounting (AAA) working groups are currently looking at defining the requirements for Authentication, Authorization, and Accounting. This document contains the requirements which would have to be supported ...

S. Glass; T. Hiller; S. Jacobs; C. Perkins

2000-10-01T23:59:59.000Z

63

Authentication of FPGA bitstreams: why and how  

Science Conference Proceedings (OSTI)

Encryption of volatile FPGA bitstreams provides confidentiality to the design but does not ensure its authenticity. This paper motivates the need for adding authentication to the configuration process by providing application examples where this functionality ...

Saar Drimer

2007-03-01T23:59:59.000Z

64

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

65

Attributes of the Federal Energy Management Program's Federal Site Building Characteristics Database  

SciTech Connect

Typically, the Federal building stock is referred to as a group of about one-half million buildings throughout the United States. Additional information beyond this level is generally limited to distribution of that total by agency and maybe distribution of the total by state. However, additional characterization of the Federal building stock is required as the Federal sector seeks ways to implement efficiency projects to reduce energy and water use intensity as mandated by legislation and Executive Order. Using a Federal facility database that was assembled for use in a geographic information system tool, additional characterization of the Federal building stock is provided including information regarding the geographical distribution of sites, building counts and percentage of total by agency, distribution of sites and building totals by agency, distribution of building count and floor space by Federal building type classification by agency, and rank ordering of sites, buildings, and floor space by state. A case study is provided regarding how the building stock has changed for the Department of Energy from 2000 through 2008.

Loper, Susan A.; Sandusky, William F.

2010-12-31T23:59:59.000Z

66

Attributes of the Federal Energy Management Program's Federal Site Building Characteristics Database  

SciTech Connect

Typically, the Federal building stock is referred to as a group of about one-half million buildings throughout the United States. Additional information beyond this level is generally limited to distribution of that total by agency and maybe distribution of the total by state. However, additional characterization of the Federal building stock is required as the Federal sector seeks ways to implement efficiency projects to reduce energy and water use intensity as mandated by legislation and Executive Order. Using a Federal facility database that was assembled for use in a geographic information system tool, additional characterization of the Federal building stock is provided including information regarding the geographical distribution of sites, building counts and percentage of total by agency, distribution of sites and building totals by agency, distribution of building count and floor space by Federal building type classification by agency, and rank ordering of sites, buildings, and floor space by state. A case study is provided regarding how the building stock has changed for the Department of Energy from 2000 through 2008.

Loper, Susan A.; Sandusky, William F.

2010-12-31T23:59:59.000Z

67

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

68

Best Practices for Application of Database Standards to Substation Operation and Management  

Science Conference Proceedings (OSTI)

In order to lower costs while maintaining reliability, utilities need to optimize the effective and efficient use of their assets. A key to increasing return on assets (ROA) is the ability to analyze asset and work management operations in a timely and cost-effective fashion. This report discusses how a utility can increase ROA through deployment of a platform for asset related analysis applications that creates a Virtual Data Warehouse (VDW) that allows distributed and unstandardized data to be accessed...

2003-06-25T23:59:59.000Z

69

REDD+ Database | Open Energy Information  

Open Energy Info (EERE)

REDD+ Database REDD+ Database Jump to: navigation, search Tool Summary Name: REDD+ Database Agency/Company /Organization: Institute for Global Environmental Strategies Sector: Land Focus Area: Forestry Topics: Co-benefits assessment, Implementation, Background analysis Resource Type: Dataset Website: redd-database.iges.or.jp/redd/ REDD+ Database Screenshot References: REDD+ Database[1] Overview "The purpose of this database is to make information on REDD+ preparedness activities and projects available in a succinct manner to forest stakeholders and other interested groups, with the objective of supporting efforts to achieve climate change mitigation, resource conservation and positive development outcomes through sustainable forest management." References ↑ "REDD+ Database"

70

From Authentication to Authorization  

E-Print Network (OSTI)

PKIs focus on establishing a link between an entity and a key. Hence, PKIs provide a mechanism for entity identification by providing a link between an entity and a key. However, the real requirement in many systems is authorization, i.e., is a certain entity authorized to perform a specific action. For example, imagine a program for course registration at a university. Suppose a student, John Doe, wants to register for a graduate course in Computer Science. In order for a student to register for this course, he/she should be a graduate student in Computer Science or a undergraduate student with the requisite standing, e.g. a senior with GPA above 3.5. Therefore, the registration program needs to know that John Doe has the required credentials. In the PKI setting, John Doe will present a certificate (signed by a trusted certificate authority) which binds his identity to a key. This establishes that John Doe is interacting with the registration program. The program then consults a database to verify that John Doe has the required credentials. In this scenario, the PKI approach has the following disadvantages: Authorization decisions are adhoc

Somesh Jha

2001-01-01T23:59:59.000Z

71

Environment/Health/Safety (EHS): Databases  

NLE Websites -- All DOE Office Websites (Extended Search)

System) (for findings 122005 to present) Chemical Management System Confined Spaces Inventory Electrical Safety Emergency Services Program Database Ergonomics Database (to read...

72

ARM - Central Authentication Service  

NLE Websites -- All DOE Office Websites (Extended Search)

History History Organization Participants Facility Statistics Forms Contacts Research Themes Research Highlights Journal Articles Collaborations Atmospheric System Research (ASR) Propose a Campaign Submitting Proposals: Guidelines Featured Campaigns Campaign Data List of Campaigns Aerial Facility Mobile Facilities North Slope of Alaska Southern Great Plains Tropical Western Pacific Eastern North Atlantic Location Table Contacts Instrument Datastreams Value-Added Products PI Data Products Field Campaign Data Related Data Data Plots Data Policy Data Documentation Data Gathering and Delivery Data Quality Data Tools Data Archive Data Management Facility External Data Center Features and Releases Facility News Blogs: Air Time & Field Notes Meetings and Events Employment Research Highlights Data Announcements

73

NIST SP 800-146, DRAFT Cloud Computing Synopsis and ...  

Science Conference Proceedings (OSTI)

... Middleware components may provide database services, user authentication services, identity management, account management, etc. ...

2013-04-29T23:59:59.000Z

74

User Authentication Policy | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Eureka / Gadzooks Eureka / Gadzooks Policies Pullback Policy ALCF Acknowledgment Policy Account Sponsorship & Retention Policy Accounts Policy Data Policy INCITE Quarterly Report Policy Job Scheduling Policy on BG/P Job Scheduling Policy on BG/Q Refund Policy Software Policy User Authentication Policy Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] User Authentication Policy Users of the Argonne production systems are required to use a CRYPTOCard one time password, multifactor authentication system. This document explains the policies users must follow regarding CRYPTOCard tokens for accessing the Argonne resources. MultiFactor Authentication "Authentication systems are frequently described by the authentication

75

A TESLA-Based Mutual Authentication . . .  

E-Print Network (OSTI)

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against man-in-the-middle attacks. Several solutions have been proposed to establish mutual entity authentication. However, none provide a flaw-free bilateral authentication protocol. In this paper, we show that a recently proposed solution is vulnerable to a "type attack". Then, we propose a novel mutual entity authentication using the TESLA protocol. The proposed solution not only provides secure bilateral authentication, but also decreases the call setup time and the required connection bandwidth. An important feature of the proposed protocol is that it is compatible with the GSM standard.

Ali Fanian; Mehdi Berenjkoub; T. Aaron Gulliver

2009-01-01T23:59:59.000Z

76

Obfuscated authentication systems, devices, and methods  

SciTech Connect

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

77

Quantum Key Distribution Protocol with User Authentication  

E-Print Network (OSTI)

We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

2005-01-01T23:59:59.000Z

78

Secure Symmetric Authentication for RFID Tags  

E-Print Network (OSTI)

cryptographically secure authentication. Starting with a short introduction into common RFID systems with passive tags, we present a motivation why secure authentication with standardized symmetric crypto algorithms for RFID tags is necessary for many applications. We demonstrate vulnerabilities of current RFID systems and explain how application of an authentication mechanism can solve them. Furthermore we explain how authentication protocols work and how they can be included in the RFID protocol standard ISO 18000. By presenting the interim results of ART, we will show that the proposed enhancement is feasible with current RIFD infrastructure and silicon technology used for RFID tags.

Manfred Aigner; Martin Feldhofer

2005-01-01T23:59:59.000Z

79

Central Internet Database (CID) Home  

Office of Environmental Management (EM)

Banner Welcome to the updated Central Internet Database (CID) The CID is a gateway to waste management and facility information from current and archived Department of Energy...

80

Context-based authentication and transport of cultural assets  

Science Conference Proceedings (OSTI)

We present a ubiquitous system that combines context information, security mechanisms and a transport infrastructure to provide authentication and secure transport of works of art. Authentication is provided for both auctions and exhibitions, where users ... Keywords: Authentication, Ubiquitous systems

Leonardo Mostarda; Changyu Dong; Naranker Dulay

2010-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Partially materialized digest scheme: an efficient verification method for outsourced databases  

Science Conference Proceedings (OSTI)

In the outsourced database model, a data owner publishes her database through a third-party server; i.e., the server hosts the data and answers user queries on behalf of the owner. Since the server may not be trusted, or may be compromised, users need ... Keywords: Authentication in outsourced databases, Query result verification

Kyriakos Mouratidis; Dimitris Sacharidis; Hweehwa Pang

2009-01-01T23:59:59.000Z

82

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Virtual Server Environment Lets Remote Authenticated 8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges April 22, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in HP Virtual Server Environment. A remote authenticated user can obtain elevated privileges on the target system. PLATFORM: HP Virtual Server Environment prior to v6.3 ABSTRACT: A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges. reference LINKS: HP Document ID: c02749050 SecurityTracker Alert ID: 1025429 CVE-2011-1724 HP Insight Software media set 6.3 HP Technical Knowledge Base Discussion: System management and security procedures must be reviewed frequently to

83

T-608: HP Virtual Server Environment Lets Remote Authenticated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated...

84

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook access using...

85

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network (OSTI)

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

86

Back-of-device authentication on smartphones  

Science Conference Proceedings (OSTI)

This paper presents BoD Shapes, a novel authentication method for smartphones that uses the back of the device for input. We argue that this increases the resistance to shoulder surfing while remaining reasonably fast and easy-to-use. We performed ... Keywords: authentication, back of device interaction, security

Alexander De Luca; Emanuel von Zezschwitz; Ngo Dieu Huong Nguyen; Max-Emanuel Maurer; Elisa Rubegni; Marcello Paolo Scipioni; Marc Langheinrich

2013-04-01T23:59:59.000Z

87

On selecting Gabor features for biometric authentication  

Science Conference Proceedings (OSTI)

We describe a Gabor feature selection technique that allows us to develop a fast and robust Gabor-feature based biometric system. Existing Gabor based methods use a huge number of Gabor features to represent the patterns. Our experiments on different ... Keywords: Gabor features, automated identification, biometrics, ear authentication, equal error rate, feature selection, finger authentication

Loris Nanni; Alessandra Lumini

2009-04-01T23:59:59.000Z

88

Group-Based Authentication and Key Agreement  

Science Conference Proceedings (OSTI)

This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes ... Keywords: Authentication and key agreement, Group key, Roaming, Security, Wireless network

Yu-Wen Chen; Jui-Tang Wang; Kuang-Hui Chi; Chien-Chao Tseng

2012-02-01T23:59:59.000Z

89

A class of authentication codes with secrecy  

Science Conference Proceedings (OSTI)

We study a class of authentication codes with secrecy. We determine the maximum success probabilities of the impersonation and the substitution attacks on these codes and the level of secrecy. Therefore we give an answer to an open problem stated in ... Keywords: 14G50, 94A60, 94A62, Algebraic function fields, Authentication codes with secrecy, Linearized polynomial

Elif Kurtaran Özbudak; Ferruh Özbudak; Zülfükar Sayg?

2011-04-01T23:59:59.000Z

90

Plugging a Scalable Authentication Framework into Shibboleth  

Science Conference Proceedings (OSTI)

In a VO (virtual organisation) environment where services are provided and shared by dissimilar organisations from different administrative domains and are protected with dissimilar security policies and measures, there is a need for a flexible authentication ... Keywords: Grid authentication, security architecture, smart tokens.

N. Zhang; L. Yao; J. Chin; A. Nenadic; A. McNab; A. Rector; C. Goble; Q. Shi

2005-06-01T23:59:59.000Z

91

Security Automation and the National Vulnerability Database  

Science Conference Proceedings (OSTI)

... 6 Page 7. National Vulnerability Database Role Receive CVE ... Environmental Integrity ... Use Case: Vulnerability Management CVE 2012-3544 30 ...

2013-06-05T23:59:59.000Z

92

Information Solutions: Database Applications  

NLE Websites -- All DOE Office Websites (Extended Search)

Database Applications Database Applications Argonne DOE-BES Central User Facility: A-Z People Query Data Warehouse Edits Registration | Registration Processing Security Admin Beamline Component Database System to manage beamline components. Beamline Downtime Report - UES Floor coordinator's downtime entry and reporting system. Beamline Directory | Beamline Entry Administration Links to the beamline websites and to detailed information about the equipment, techniques and contact information of a beamline. Beamline Usage and Scheduling System Long term schedule query and edit. Beamline schedule query and edit. Watchman and PSS data. Budget Proposal System Allows user to submit budget proposals via the web. Beamline Statistics Menu Query, entry and reporting of beamline statistics for ALD use only.

93

V-231: Cisco Identity Services Engine Discloses Authentication...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents...

94

A secure and efficient strong-password authentication protocol  

Science Conference Proceedings (OSTI)

Password authentication protocols are divided into two types. One employs the easy-to-remember password while the other requires the strong password. In 2001, Lin et al. proposed an optimal strong-password authentication protocol (OSPA) to resist the ... Keywords: denial-of-service attack, mutual authentication, password authentication, smart card, stolen-verifier attack, strong password

Ya-Fen Chang; Chin-Chen Chang

2004-07-01T23:59:59.000Z

95

A simple threshold authenticated key exchange from short secrets  

Science Conference Proceedings (OSTI)

This paper brings the password-based authenticated key exchange (PAKE) problem closer to practice. It takes into account the presence of firewalls when clients communicate with authentication servers. An authentication server can indeed be seen as two ... Keywords: password-based authentication, threshold protocols

Michel Abdalla; Olivier Chevassut; Pierre-Alain Fouque; David Pointcheval

2005-12-01T23:59:59.000Z

96

Crystallographic Databases  

Science Conference Proceedings (OSTI)

... By way of illustration, searching the ICSD database for yttrium-barium-copper- oxide, a common ... ICSD #63,483: Example of search results. ...

2013-03-13T23:59:59.000Z

97

Pathogen Databases  

NLE Websites -- All DOE Office Websites (Extended Search)

Databases Los Alamos scientists are working on developing the next-generation of biofuels. Get Expertise Rebecca McDonald Bioscience Email Jose A. Olivares Bioscience Email...

98

Structural Databases  

Science Conference Proceedings (OSTI)

... c) http://bioinfo.nist.gov/biofuels/ A resource for Biofuels. ... Biofuels database (c) is a structural resource for biofuels research. ...

2012-10-01T23:59:59.000Z

99

Databases - TMS  

Science Conference Proceedings (OSTI)

Principal Metals inventory database, 0, 734, Lynette Karabin, 2/9/2007 5:41 AM by Lynette Karabin. New Messages, Rating, WEB RESOURCE: Corrosion ...

100

Safety & Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Coordination Management andor Coordination of APS Site WorkServices Safety & Emergency Management Database Maintenance Personnel Safety & Emergency Management Area...

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Password based key exchange with mutual authentication  

Science Conference Proceedings (OSTI)

A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [17] and later by Gennaro and Lindell [13]. However, these protocols do not support mutual authentication ...

Shaoquan Jiang; Guang Gong

2004-08-01T23:59:59.000Z

102

Database and Analytical Tool Development for the Management of Data Derived from US DOE (NETL) Funded Fine Particulate (PM2.5) Research  

Science Conference Proceedings (OSTI)

Advanced Technology Systems, Inc. (ATS) was contracted by the U. S. Department of Energy's National Energy Technology Laboratory (DOE-NETL) to develop a state-of-the-art, scalable and robust web-accessible database application to manage the extensive data sets resulting from the DOE-NETL-sponsored ambient air monitoring programs in the upper Ohio River valley region. The data management system was designed to include a web-based user interface that will allow easy access to the data by the scientific community, policy- and decision-makers, and other interested stakeholders, while providing detailed information on sampling, analytical and quality control parameters. In addition, the system will provide graphical analytical tools for displaying, analyzing and interpreting the air quality data. The system will also provide multiple report generation capabilities and easy-to-understand visualization formats that can be utilized by the media and public outreach/educational institutions. The project was conducted in two phases. Phase One included the following tasks: (1) data inventory/benchmarking, including the establishment of an external stakeholder group; (2) development of a data management system; (3) population of the database; (4) development of a web-based data retrieval system, and (5) establishment of an internal quality assurance/quality control system on data management. Phase Two involved the development of a platform for on-line data analysis. Phase Two included the following tasks: (1) development of a sponsor and stakeholder/user website with extensive online analytical tools; (2) development of a public website; (3) incorporation of an extensive online help system into each website; and (4) incorporation of a graphical representation (mapping) system into each website. The project is now technically completed.

Robinson Khosah

2007-07-31T23:59:59.000Z

103

Database and Analytical Tool Development for the Management of Data Derived from US DOE (NETL) Funded Fine Particulate (PM2.5) Research  

Science Conference Proceedings (OSTI)

Advanced Technology Systems, Inc. (ATS) was contracted by the U. S. Department of Energy's National Energy Technology Laboratory (DOE-NETL) to develop a state-of-the-art, scalable and robust web-accessible database application to manage the extensive data sets resulting from the DOE-NETL-sponsored ambient air monitoring programs in the upper Ohio River valley region. The data management system was designed to include a web-based user interface that will allow easy access to the data by the scientific community, policy- and decision-makers, and other interested stakeholders, while providing detailed information on sampling, analytical and quality control parameters. In addition, the system will provide graphical analytical tools for displaying, analyzing and interpreting the air quality data. The system will also provide multiple report generation capabilities and easy-to-understand visualization formats that can be utilized by the media and public outreach/educational institutions. The project is being conducted in two phases. Phase One includes the following tasks: (1) data inventory/benchmarking, including the establishment of an external stakeholder group; (2) development of a data management system; (3) population of the database; (4) development of a web-based data retrieval system, and (5) establishment of an internal quality assurance/quality control system on data management. Phase Two, which is currently underway, involves the development of a platform for on-line data analysis. Phase Two includes the following tasks: (1) development of a sponsor and stakeholder/user website with extensive online analytical tools; (2) development of a public website; (3) incorporation of an extensive online help system into each website; and (4) incorporation of a graphical representation (mapping) system into each website. The project is now into its forty-eighth month of development activities.

Robinson P. Khosah; Frank T. Alex

2007-02-11T23:59:59.000Z

104

DATABASE AND ANALYTICAL TOOL DEVELOPMENT FOR THE MANAGEMENT OF DATA DERIVED FROM US DOE (NETL) FUNDED FINE PARTICULATE (PM 2.5) RESEARCH  

Science Conference Proceedings (OSTI)

Advanced Technology Systems, Inc. (ATS) was contracted by the U. S. Department of Energy's National Energy Technology Laboratory (DOE-NETL) to develop a state-of-the-art, scalable and robust web-accessible database application to manage the extensive data sets resulting from the DOE-NETL-sponsored ambient air monitoring programs in the upper Ohio River valley region. The data management system was designed to include a web-based user interface that will allow easy access to the data by the scientific community, policy- and decision-makers, and other interested stakeholders, while providing detailed information on sampling, analytical and quality control parameters. In addition, the system will provide graphical analytical tools for displaying, analyzing and interpreting the air quality data. The system will also provide multiple report generation capabilities and easy-to-understand visualization formats that can be utilized by the media and public outreach/educational institutions. The project is being conducted in two phases. Phase One includes the following tasks: (1) data inventory/benchmarking, including the establishment of an external stakeholder group; (2) development of a data management system; (3) population of the database; (4) development of a web-based data retrieval system, and (5) establishment of an internal quality assurance/quality control system on data management. Phase Two, which is currently underway, involves the development of a platform for on-line data analysis. Phase Two includes the following tasks: (1) development of a sponsor and stakeholder/user website with extensive online analytical tools; (2) development of a public website; (3) incorporation of an extensive online help system into each website; and (4) incorporation of a graphical representation (mapping) system into each website. The project is now into its forty-second month of development activities.

Robinson P. Khosah; Charles G. Crawford

2006-02-11T23:59:59.000Z

105

DATABASE AND ANALYTICAL TOOL DEVELOPMENT FOR THE MANAGEMENT OF DATA DERIVED FROM US DOE (NETL) FUNDED FINE PARTICULATE (PM2.5) RESEARCH  

SciTech Connect

Advanced Technology Systems, Inc. (ATS) was contracted by the U. S. Department of Energy's National Energy Technology Laboratory (DOE-NETL) to develop a state-of-the-art, scalable and robust web-accessible database application to manage the extensive data sets resulting from the DOE-NETL-sponsored ambient air monitoring programs in the upper Ohio River valley region. The data management system was designed to include a web-based user interface that will allow easy access to the data by the scientific community, policy- and decision-makers, and other interested stakeholders, while providing detailed information on sampling, analytical and quality control parameters. In addition, the system will provide graphical analytical tools for displaying, analyzing and interpreting the air quality data. The system will also provide multiple report generation capabilities and easy-to-understand visualization formats that can be utilized by the media and public outreach/educational institutions. The project is being conducted in two phases. Phase 1, which is currently in progress and will take twelve months to complete, will include the following tasks: (1) data inventory/benchmarking, including the establishment of an external stakeholder group; (2) development of a data management system; (3) population of the database; (4) development of a web-based data retrieval system, and (5) establishment of an internal quality assurance/quality control system on data management. In Phase 2, which will be completed in the second year of the project, a platform for on-line data analysis will be developed. Phase 2 will include the following tasks: (1) development of a sponsor and stakeholder/user website with extensive online analytical tools; (2) development of a public website; (3) incorporation of an extensive online help system into each website; and (4) incorporation of a graphical representation (mapping) system into each website. The project is now into its sixth month of Phase 1 development activities.

Robinson P. Khosah; Charles G. Crawford

2003-03-13T23:59:59.000Z

106

PDF MANUAL: Thermo-Calc Database Guide - TMS  

Science Conference Proceedings (OSTI)

Feb 9, 2007 ... This guide provides a comprehensive overview of the Thermo-Calc databases as well as a Database Manager's Guide for using the software.

107

Central Internet Database (CID)  

Office of Environmental Management (EM)

CID Reports > Archived CID Reports > Archived Reports Central Internet Database CID Photo Banner Archived Reports The reports in the Archived Reports section of the CID are based on the FY 2001 EM Corporate Database (except the Buried TRU Report). The EM Corporate database stores information on radioactive waste, contaminated media, and spent nuclear fuel by identifying "streams" of material. A "stream" is defined as a group of materials, media, or waste having similar origins or management requirements. Radioactive waste, contaminated media, or spent nuclear fuel may be part of more than one "stream" from the time it is generated to the time it is permanently disposed, depending on the physical location or the management activity it is undergoing. The CID retains the "stream" concept as part of its data structure.

108

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents (OSTI)

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

109

Energetics Databases  

Science Conference Proceedings (OSTI)

Thermodynamic databases. Thermotech Sente Software. Al, Mg, Fe, Ni, NiFe- Super, Ti, TiAl alloy data (fee), 0, 1978, Cathy Rohrer, 4/8/2008 8:59 AM by Cathy  ...

110

On the cost of multilingualism in database systems  

Science Conference Proceedings (OSTI)

Database engines are well-designed for storing and processing text data based on Latin scripts. But in today's global village, databases should ideally support multilingual text data equally efficiently. While current database systems do support management ...

A. Kumaran; Jayant R. Haritsa

2003-09-01T23:59:59.000Z

111

Physical Database Design: the database professional's guide to exploiting indexes, views, storage, and more  

Science Conference Proceedings (OSTI)

The rapidly increasing volume of information contained in relational databases places a strain on databases, performance, and maintainability: DBAs are under greater pressure than ever to optimize database structure for system performance and administration. ... Keywords: Data Modeling & Design, Data Warehousing, Database Management, Information Technology

Sam S. Lightstone; Toby J. Teorey; Tom Nadeau

2007-03-01T23:59:59.000Z

112

Integrating databases and workflow systems  

Science Conference Proceedings (OSTI)

There has been an information explosion in fields of science such as high energy physics, astronomy, environmental sciences and biology. There is a critical need for automated systems to manage scientific applications and data. Database technology is ...

Srinath Shankar; Ameet Kini; David J. DeWitt; Jeffrey Naughton

2005-09-01T23:59:59.000Z

113

Database support for uncertain data  

Science Conference Proceedings (OSTI)

In recent years, the field of uncertainty management in databases has received considerable interest due to the presence of numerous applications that handle probabilistic data. In this dissertation, we identify and solve important issues ...

Sarvjeet Singh / Sunil Prabhakar

2009-01-01T23:59:59.000Z

114

T-646: Debian fex authentication bypass | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Debian fex authentication bypass 6: Debian fex authentication bypass T-646: Debian fex authentication bypass June 14, 2011 - 3:45pm Addthis PROBLEM: The vulnerability is caused due to the application not properly verifying the existence of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the service properly validates existing authentication IDs, an attacker who is not specifying any authentication ID at all, can bypass the authentication procedure. reference LINKS: DSA-2259-1 fex Secunia Advisory SA44940 Debian Security Advisory DSA-2259-1 fex-20110610.tar Vulnerability Report: Debian GNU/Linux 6.0

115

Kerberos authentication: The security answer for unsecured networks  

Science Conference Proceedings (OSTI)

Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

Engert, D.E.

1995-06-01T23:59:59.000Z

116

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

117

National Carbon Sequestration Database and Geographical Information...  

NLE Websites -- All DOE Office Websites (Extended Search)

of this project is to construct a relational database management system with spatial query capabilities to evaluate the geographic distribution, physical characteristics,...

118

WEB RESOURCE: Central Internet Database - TMS  

Science Conference Proceedings (OSTI)

May 15, 2007 ... Topic Title: WEB RESOURCE: Central Internet Database Topic Summary: DOE. Integrates waste management and cleanup data from multiple ...

119

Using Rose and Compass for Authentication  

Science Conference Proceedings (OSTI)

Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

White, G

2009-07-09T23:59:59.000Z

120

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

High Performance Buildings Database  

DOE Data Explorer (OSTI)

The High Performance Buildings Database is a shared resource for the building industry. The Database, developed by the U.S. Department of Energy and the National Renewable Energy Laboratory (NREL), is a unique central repository of in-depth information and data on high-performance, green building projects across the United States and abroad. The Database includes information on the energy use, environmental performance, design process, finances, and other aspects of each project. Members of the design and construction teams are listed, as are sources for additional information. In total, up to twelve screens of detailed information are provided for each project profile. Projects range in size from small single-family homes or tenant fit-outs within buildings to large commercial and institutional buildings and even entire campuses.

The Database is a data repository as well. A series of Web-based data-entry templates allows anyone to enter information about a building project into the database. Once a project has been submitted, each of the partner organizations can review the entry and choose whether or not to publish that particular project on its own Web site. Early partners using the database include:

  • The Federal Energy Management Program
  • The U.S. Green Building Council
  • The American Institute of Architects' Committee on the Environment
  • The Massachusetts Technology Collaborative
  • Efficiency Vermont
    • Copied (then edited) from http://eere.buildinggreen.com/partnering.cfm

122

Database Support for Weighted Match Joins  

Science Conference Proceedings (OSTI)

As relational database management systems are applied to non-traditional domains such as scientific data management, there is an increasing need to support queries with semantics that differ from those appropriate for traditional RDBMS applications. ...

Ameet Kini; Jeffrey F. Naughton

2007-07-01T23:59:59.000Z

123

NETL: Computer Software & Databases  

NLE Websites -- All DOE Office Websites (Extended Search)

Databases Crude Oil Analysis Database: Database contains information on 9,056 crude oil analyses performed at the National Institute for Petroleum and Energy Research (NIPER). The...

124

NPP Database Dictionary  

NLE Websites -- All DOE Office Websites (Extended Search)

The NPP Database Dictionary defines the common terms, codes, and conventions used in the database. Data in the NPP Database may have been reformatted to achieve consistency in...

125

Active and passive rules for complex object databases  

Science Conference Proceedings (OSTI)

ecution: the management of multiple rules activation, and the definition ... the database management systems allowing the definition of ... maintenance [2: 3].

126

Groundwater Database | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Groundwater Database Groundwater Database Groundwater Database DOE has one of the largest ground water contamination problems and subsequent cleanup responsibilities for a single entity in the world, in terms of the sheer volume of affected groundwater, number of plumes, range of hydrogeologic settings, and diversity of contaminant types. The Groundwater Database was developed to provide a centralized location for information relating to groundwater flow, contamination, and remedial approaches across the DOE complex. The database provides DOE management and other interested parties with an easily accessible, high level understanding of the type of contamination, magnitude of contamination, and dynamics of groundwater systems at DOE sites. It also identifies remedial approaches, exit strategies, long-term stewardship requirements, regulatory

127

Linguistic Databases  

E-Print Network (OSTI)

this paper is organized as follows. We first provide a brief introduction to relevant aspects of Russian morphology and nominalization. We then turn to the question of the argument structure of deverbal nominals, providing a short summary of Grimshaw's analysis of English nominalizations. The following sections focus on the Russian data and the database application. A final section presents our findings. The reader who is interested primarily on our linguistic findings may find a preliminary analysis of these in Sadler, Spencer and Zaretskaya 1994.

Andrew Bredenkamp; Louisa Sadler; Andrew Spencer

1996-01-01T23:59:59.000Z

128

The CEBAF Element Database  

Science Conference Proceedings (OSTI)

With the inauguration of the CEBAF Element Database (CED) in Fall 2010, Jefferson Lab computer scientists have taken a step toward the eventual goal of a model-driven accelerator. Once fully populated, the database will be the primary repository of information used for everything from generating lattice decks to booting control computers to building controls screens. A requirement influencing the CED design is that it provide access to not only present, but also future and past configurations of the accelerator. To accomplish this, an introspective database schema was designed that allows new elements, types, and properties to be defined on-the-fly with no changes to table structure. Used in conjunction with Oracle Workspace Manager, it allows users to query data from any time in the database history with the same tools used to query the present configuration. Users can also check-out workspaces to use as staging areas for upcoming machine configurations. All Access to the CED is through a well-documented Application Programming Interface (API) that is translated automatically from original C++ source code into native libraries for scripting languages such as perl, php, and TCL making access to the CED easy and ubiquitous.

Theodore Larrieu, Christopher Slominski, Michele Joyce

2011-03-01T23:59:59.000Z

129

System and method for authentication of goods  

SciTech Connect

An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

Kaish, Norman (West Hampstead, NY); Fraser, Jay (Freeport, NY); Durst, David I. (Syosset, NY)

1999-01-01T23:59:59.000Z

130

System and method for authentication of goods  

SciTech Connect

An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity is disclosed. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

Kaish, N.; Fraser, J.; Durst, D.I.

1999-10-26T23:59:59.000Z

131

V-231: Cisco Identity Services Engine Discloses Authentication Credentials  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Cisco Identity Services Engine Discloses Authentication 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services Engine REFERENCE LINKS: SecurityTracker Alert ID: 1028965 CVE-2013-3471 IMPACT ASSESSMENT: Meduim DISCUSSION: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials.The system stores the username and password of an authenticated user within hidden HTML form fields. A

132

NIST: Triatomic Spectral Database  

Science Conference Proceedings (OSTI)

... are listed with one standard deviation uncertainty for all values. ... Database Main Page Molecular Spectral Databases: Microwaves home page. ...

2011-12-09T23:59:59.000Z

133

Amateur Anthropologists: DIY Tourism as Learning Culture and Accessing Authenticity  

E-Print Network (OSTI)

Paula. A. Tourists as Pilgrims: Commercial Fashioning of1983:20). Considering tourists as pilgrims of sacralization,is a kind of contemporary pilgrim, seeking authenticity in

Nishijima, Ryoko

2012-01-01T23:59:59.000Z

134

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

135

Knowledge Management Database (KMD) Portal  

NLE Websites -- All DOE Office Websites (Extended Search)

Shelf: The reference shelf contains links to oil and natural gas reports, newsletters ("E&P Focus" and "Fire in the Ice"), brochures, program documents, and software. Oil and...

136

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

137

Towards inclusive identity management  

Science Conference Proceedings (OSTI)

The article argues for a shift of perspective in identity management (IDM) research and development. Accessibility and usability issues affect identity management to such an extent that they demand a reframing and reformulation of basic designs and requirements ... Keywords: Authentication, Disabilities, E-Inclusion, Exclusion, Identity management, Information security, Privacy, Universal design, Usability

Lothar Fritsch; Kristin Skeide Fuglerud; Ivar Solheim

2010-12-01T23:59:59.000Z

138

Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks  

E-Print Network (OSTI)

Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

Ning, Peng

139

A framework for password-based authenticated key exchange1  

Science Conference Proceedings (OSTI)

In this paper, we present a general framework for password-based authenticated key exchange protocols, in the common reference string model. Our protocol is actually an abstraction of the key exchange protocol of Katz et al. and is based on the recently ... Keywords: Passwords, authentication, dictionary attack, projective hash functions

Rosario Gennaro; Yehuda Lindell

2006-05-01T23:59:59.000Z

140

On Automatic Authenticity Verification of Printed Security Documents  

Science Conference Proceedings (OSTI)

This paper presents a pioneering effort to involve machine in checking document authenticity. A particular class of security documents has been considered for the present experiment. Bank cheques, several kinds of tickets like lottery tickets, air tickets, ... Keywords: authenticity verification, security document, forensic document examination, bank cheques

Utpal Garain; Biswajit Halder

2008-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Robust secret key based authentication scheme using smart cards  

Science Conference Proceedings (OSTI)

User authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. Recently, Chen et al. proposed an improvement on the SAS-like password ... Keywords: authentication, cryptography, secret key, smart card

Eun-Jun Yoon; Kee-Young Yoo

2005-11-01T23:59:59.000Z

142

An improved anonymous authentication and key exchange scheme  

Science Conference Proceedings (OSTI)

Nowadays, anonymity property of user authentication scheme becomes important. In 2003, Park et al. proposed an authentication and key exchange scheme using smart card. However, Juang et al. pointed out that Park et al.'s scheme did not provide the user ...

Kyung-kug Kim; Myung-Hwan Kim

2012-09-01T23:59:59.000Z

143

Challenges and architectural approaches for authenticating mobile users  

Science Conference Proceedings (OSTI)

This paper casts an architectural eye at existing work on security and privacy in mobile computing. Specifically, it focuses on authentication as it leads up to access control from two points of view: servicer providers granting access to users, and ... Keywords: access control, anonymity, authentication, mobile computing, trust, ubiquitous computing, user mobility

Joăo Pedro Sousa

2008-05-01T23:59:59.000Z

144

Mutual Authentication for Low-Power Mobile Devices  

Science Conference Proceedings (OSTI)

We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical implants and contactless smart cards. We prove the security of our schemes ... Keywords: gap problem, low power, medical informatics, mutual authentication

Markus Jakobsson; David Pointcheval

2002-02-01T23:59:59.000Z

145

RFID authentication protocol for low-cost tags  

Science Conference Proceedings (OSTI)

In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy ... Keywords: privacy, rfid authentication protocol, security

Boyeon Song; Chris J. Mitchell

2008-03-01T23:59:59.000Z

146

Hardware authentication using transmission spectra modified optical fiber.  

SciTech Connect

The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

Grubbs, Robert K.; Romero, Juan A.

2010-09-01T23:59:59.000Z

147

Nuclear Concrete Materials Database Phase I Development  

Science Conference Proceedings (OSTI)

The FY 2011 accomplishments in Phase I development of the Nuclear Concrete Materials Database to support the Light Water Reactor Sustainability Program are summarized. The database has been developed using the ORNL materials database infrastructure established for the Gen IV Materials Handbook to achieve cost reduction and development efficiency. In this Phase I development, the database has been successfully designed and constructed to manage documents in the Portable Document Format generated from the Structural Materials Handbook that contains nuclear concrete materials data and related information. The completion of the Phase I database has established a solid foundation for Phase II development, in which a digital database will be designed and constructed to manage nuclear concrete materials data in various digitized formats to facilitate electronic and mathematical processing for analysis, modeling, and design applications.

Ren, Weiju [ORNL; Naus, Dan J [ORNL

2012-05-01T23:59:59.000Z

148

Gasification Plant Databases  

NLE Websites -- All DOE Office Websites (Extended Search)

Gasification Systems Gasification Plant Databases Welcome to the U. S. Department of Energy, National Energy Technology Laboratory's Gasification Plant Databases Within these...

149

MEMS based storage architecture for relational databases  

Science Conference Proceedings (OSTI)

Due to recent advances in semiconductor manufacturing, the gap between main memory and disks is constantly increasing. This leads to a significant performance bottleneck for Relational Database Management Systems. Recent advances in nanotechnology have ... Keywords: Data placement, MEMS, Relational databases, Storage

Hailing Yu; Divyakant Agrawal; Amr El Abbadi

2007-04-01T23:59:59.000Z

150

Design and development of algorithms for identifying termination of triggers in active databases  

Science Conference Proceedings (OSTI)

An active database system is a conventional database system extended with a facility for managing triggers (or active rules). Active database systems can react to the occurrence of some predefined events automatically. In many applications, active rules ...

R. Manicka Chezian; T. Devi

2011-12-01T23:59:59.000Z

151

UPI: A Primary Index for Uncertain Databases  

E-Print Network (OSTI)

Uncertain data management has received growing attention from industry and academia. Many efforts have been made to optimize uncertain databases, including the development of special index data structures. However, none ...

Kimura, Hideaki

152

Databases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Databases Databases Databases November 1, 2013 - 11:40am Addthis DOE has supported the development of several combined heat and power (CHP) and distributed energy (DE) databases that have proven to be "go-to" resources for end users. These resources include an installation database that tracks CHP projects in all end-use sectors for all 50 states, as well as a database of regulatory requirements for small electric generators. A searchable database of CHP project profiles compiled by the DOE Regional Clean Energy Application Centers (CEACs) is also available. CHP Project Profiles Database (launched Feb. 2011 and continuously updated) CHP State and Regional Installation Database, May 2010 Database of State Incentives for Renewables and Efficiency (DSIRE) - CHP

153

Environmental release summary (ERS) database CY 1997  

Science Conference Proceedings (OSTI)

This report discusses the Environmental Release Summary (ERS) database. The current needs of the Effluent and Environmental database is continually modified to fulfill monitoring (EEM) program (managed by Waste Management Federal Services of Hanford, Incorporated, Air and Water Services Organization). Changes are made to accurately calculate current releases, to affect how past releases are calculated. This document serves as a snap-shot of the database and software for the CY-1997 data and releases. This document contains all of the relevant data for calculating radioactive-airborne and liquid effluent. The ERS database is the official repository for the CY-1997 ERS release reports and the settings used to generate those reports. As part of the Tri-Party Agreement, FDH is committed to provide a hard copy of the ERS database for Washington State Department of Ecology, upon request. This document also serves as that hard copy for the last complete calendar year.

Gleckler, B.P.

1998-07-01T23:59:59.000Z

154

Transparent Cost Database | Transparent Cost Database  

Open Energy Info (EERE)

Hide data for this chart (-)Show data for this chart (+) Loading data... Transparent Cost Database Generation Showing: Historical Projections Year Published: Release mouse to...

155

A location based security framework for authenticating mobile phones  

Science Conference Proceedings (OSTI)

Although the utilisation of location information in mobile network access systems has given rise to a variety of applications and services, it is thought that the underlying service authentication model and the related security can be further enhanced. ...

Lishoy Francis; Keith Mayes; Gerhard Hancke; Konstantinos Markantonakis

2010-11-01T23:59:59.000Z

156

Bootstrapping Timed Efficient Stream Loss-Tolerant Authentication (TESLA)  

E-Print Network (OSTI)

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). TESLA, the Timed Efficient Stream Loss-tolerant Authentication protocol, provides source authentication in multicast scenarios. TESLA is an efficient protocol with low communication and computation overhead that scales to large numbers of receivers and also tolerates packet loss. TESLA is based on loose time synchronization between the sender and the receivers. Source authentication is realized in TESLA by using Message Authentication Code (MAC) chaining. The use

Request Comments; H. Tschofenig; Status Of This Memo

2006-01-01T23:59:59.000Z

157

Efficient password-based authenticated key exchange without public information  

Science Conference Proceedings (OSTI)

Since the first password-based authenticated key exchange (PAKE) was proposed, it has enjoyed a considerable amount of interest from the cryptographic research community. To our best knowledge, most of proposed PAKEs based on Diffie-Hellman key exchange ...

Jun Shao; Zhenfu Cao; Licheng Wang; Rongxing Lu

2007-09-01T23:59:59.000Z

158

@Yuan Xue (yuan.xue@vanderbilt.edu) Authentication Protocol  

E-Print Network (OSTI)

. If A trusts B and B is hacked, then the attacker could gain access to A. Network address impersonation (address spoofing) Ingress filtering #12;@Yuan Xue (yuan.xue@vanderbilt.edu) Cryptographic Authentication

Cui, Yi

159

U-130: JBoss Operations Network LDAP Authentication Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based...

160

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

not checked realm values were not checked the server secret was hard-coded to a known string The result of these weaknesses is that DIGEST authentication was only as secure as...

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Analog Video Authentication and Seal Verification Equipment Development  

SciTech Connect

Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

Gregory Lancaster

2012-09-01T23:59:59.000Z

162

NUCLEAR STRUCTURE DATABASE  

E-Print Network (OSTI)

d UNIVERSITY OF CALIFORNIA NUCLEAR STRUCTURE DATABASE R. B.IS UNLfflfTEO LBL-11089 NUCLEAR STRUCTURE DATABASE by R.B.and E. Browne June 1980 Nuclear Science Division University

Firestone, R.B.

2010-01-01T23:59:59.000Z

163

Partial pattern databases  

Science Conference Proceedings (OSTI)

Perimeters and pattern databases are two similar memorybased techniques used in single-agent search problems.We present partial pattern databases, which unify the two approaches into a single memorybased heuristic table. Our approach allows the use of ...

Kenneth Anderson; Robert Holte; Jonathan Schaeffer

2007-07-01T23:59:59.000Z

164

Partial information endgame databases  

Science Conference Proceedings (OSTI)

Endgame databases have previously been built based on complete analysis of endgame positions. In the domain of Checkers, where endgame databases consisting of 39 trillion positions have already been built, it would be beneficial to be able to ...

Yngvi Björnsson; Jonathan Schaeffer; Nathan R. Sturtevant

2006-09-01T23:59:59.000Z

165

The next database revolution  

Science Conference Proceedings (OSTI)

Database system architectures are undergoing revolutionary changes. Most importantly, algorithms and data are being unified by integrating programming languages with the database system. This gives an extensible object-relational system where non-procedural ...

Jim Gray

2004-06-01T23:59:59.000Z

166

Thermodynamic Databases - TMS  

Science Conference Proceedings (OSTI)

Apr 8, 2008 ... Thermodynamic databases are developed by teams of experts critically assessing all experimental phase equilibrium and thermodynamic data.

167

BIOFUELS 3D Database  

Science Conference Proceedings (OSTI)

BIOFUEL Database. NIST Home. BIOFUEL 3-D Structures ( Help / Contact / Rate Our Product and Services / NIST privacy policy ). Search: ...

168

Hazard Analysis Database report  

Science Conference Proceedings (OSTI)

This document describes and defines the Hazard Analysis Database for the Tank Waste Remediation System Final Safety Analysis Report.

Niemi, B.J.

1997-08-12T23:59:59.000Z

169

Coalfleet IGCC Permits Database  

Science Conference Proceedings (OSTI)

The CoalFleet IGCC Permits Database presents comprehensive information on permitting requirements and permit conditions for Integrated Gasification Combined Cycle (IGCC) power plants in an online database format. This Technical Update is a compilation of the Database contents as of April 1, 2009.

2009-05-01T23:59:59.000Z

170

Lessons Learned From Developing Reactor Pressure Vessel Steel Embrittlement Database  

SciTech Connect

Materials behaviors caused by neutron irradiation under fission and/or fusion environments can be little understood without practical examination. Easily accessible material information system with large material database using effective computers is necessary for design of nuclear materials and analyses or simulations of the phenomena. The developed Embrittlement Data Base (EDB) at ORNL is this comprehensive collection of data. EDB database contains power reactor pressure vessel surveillance data, the material test reactor data, foreign reactor data (through bilateral agreements authorized by NRC), and the fracture toughness data. The lessons learned from building EDB program and the associated database management activity regarding Material Database Design Methodology, Architecture and the Embedded QA Protocol are described in this report. The development of IAEA International Database on Reactor Pressure Vessel Materials (IDRPVM) and the comparison of EDB database and IAEA IDRPVM database are provided in the report. The recommended database QA protocol and database infrastructure are also stated in the report.

Wang, Jy-An John [ORNL

2010-08-01T23:59:59.000Z

171

LESSONS LEARNED AND BEST PRACTICES DATABASE USER MANUAL  

E-Print Network (OSTI)

for general information, work planning, or trend and analysis purposes. This database is designed ...................................... 5 4.0 Training Requirements Laboratory (LBNL) Issues Management Program, which was developed so that LBNL management can ensure ongoing

172

Relational Cloud: The Case for a Database Service  

E-Print Network (OSTI)

In this paper, we make the case for â databases as a serviceâ (DaaS), with two target scenarios in mind: (i) consolidation of data management functionality for large organizations and (ii) outsourcing data management ...

Wu, Eugene

2010-03-14T23:59:59.000Z

173

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

174

Search Results from DOE Databases  

Office of Scientific and Technical Information (OSTI)

Information Bridge Energy Citations Database DOE R&D Accomplishments Database DOE Data Explorer Climate Modeling Information Bridge Energy Citations Database DOE R&D...

175

The MPEG-7 Multimedia Database System (MPEG-7 MMDB)  

Science Conference Proceedings (OSTI)

Broadly used Database Management Systems (DBMS) propose multimedia extensions, like Oracle's Multimedia (formerly interMedia). However, these extensions lack means for managing the requirements of multimedia data in terms of semantic meaningful querying, ... Keywords: MPEG-7, Multimedia Database Systems, Multimedia index structures

Mario Döller; Harald Kosch

2008-09-01T23:59:59.000Z

176

A Scalable Database Approach to Computing Delaunay Triangulations  

E-Print Network (OSTI)

of database management systems in managing huge informa- tion stores for the commercial and governmental. Although unstructured scientific data sets do not map to the tabular representation of a database system. We have implemented our methodology in a prototype system called Abacus that tar- gets Delaunay

177

Implementing data security in student lifecycle management system at the university of Prishtina  

Science Conference Proceedings (OSTI)

In this paper is presented a novel approach for fulfilling the data security criteria in a Student Lifecycle Management System at the University of Prishtina. The four main criteria of data security such as: privacy, authentication, integrity and non-repudiation ... Keywords: X.509 certificate, authentication, digital signature, non-repudiation, privacy, security, smart cards, student lifecycle management

Blerim Rexha; Haxhi Lajqi; Myzafere Limani

2010-07-01T23:59:59.000Z

178

Ultra-wideband Location Authentication for Item Tracking  

SciTech Connect

International safeguards is increasingly utilizing unattended and remote monitoring methods to improve inspector efficiency and the timeliness of diversion detection. Item identification and tracking has been proposed as one unattended remote monitoring method, and a number of radio-frequency (RF) technologies have been proposed. When utilizing location information for verification purposes, strong assurance of the authenticity of the reported location is required, but most commercial RF systems are vulnerable to a variety of spoofing and relay attacks. ORNL has developed a distance bounding method that uses ultra-wideband technology to provide strong assurance of item location. This distance bounding approach can be coupled with strong symmetric key authentication methods to provide a fully authenticable tracking system that is resistant to both spoofing and relay attacks. This paper will discuss the overall problems associated with RF tracking including the common spoofing and relay attack scenarios, the ORNL distance bounding approach for authenticating location, and the potential applications for this technology.

Rowe, Nathan C [ORNL; Kuhn, Michael J [ORNL; Stinson, Brad J [ORNL; Holland, Stephen A [ORNL

2012-01-01T23:59:59.000Z

179

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

180

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network (OSTI)

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card  

Science Conference Proceedings (OSTI)

Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely ...

Kenan Kalajdzic; Ahmed Patel; Laleh Golafshan; Mona Taghavi

2011-07-01T23:59:59.000Z

182

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

E-Print Network (OSTI)

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

Li, Depeng

183

Current Projects: Product Authenticity Tags - Vulnerability Assessment Team  

NLE Websites -- All DOE Office Websites (Extended Search)

Product Authenticity Tags Product Authenticity Tags VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

184

Secure Access Control Through Challenge and Response Authentication  

E-Print Network (OSTI)

compares various types of key technology (mechanical, magnetic, contact, RFID), and evaluates these keys for their strengths and weaknesses. Keys with challenge and response authentication overcome the limitations of the traditional static data keys. The challenge and response concept is discussed; suitable keys are presented and compared. The document concludes with an explanation of why challenge and response authentication is more secure than concepts that rely on static data. A version of this app note was published by Embedded.com on March 15, 2011.

unknown authors

2011-01-01T23:59:59.000Z

185

Authentication and protection for e-finance consumers: the dichotomy of cost versus ease of use  

Science Conference Proceedings (OSTI)

Multifactor authentication is a tool to combat identity theft and is mandated by the Federal Financial Institutions Examination Council. However, there are only a few US financial institutions that have implemented two-factor authentication. A goal for ... Keywords: biometrics, e-banking, e-finance, electronic banking, electronic finance, identity theft, internet, multifactor authentication, online ID theft, online banking, phishing, security token, web authentication

Seungjae Shin; Jerry Cunningham; Jungwoo Ryoo; Jack E. Tucci

2009-03-01T23:59:59.000Z

186

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

Tygar, Doug

187

Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks  

Science Conference Proceedings (OSTI)

This paper presents an improved method inspired by the recently proposed Pretty-Simple PAKE (Password Authenticated Key-Exchange) protocol, which is already a well-known, robust and simple password authenticated key exchange scheme. In our even more ... Keywords: elliptic curve discrete logarithm, key exchange, password authentication, wireless network

Ting-Yi Chang; Chou-Chen Yang; Chia-Meng Chen

2004-04-01T23:59:59.000Z

188

Comparative study of multicast authentication schemes with application to wide-area measurement system  

Science Conference Proceedings (OSTI)

Multicasting refers to the transmission of a message to multiple receivers at the same time. To enable authentication of sporadic multicast messages, a conventional digital signature scheme is appropriate. To enable authentication of a multicast data ... Keywords: multicast authentication, multiple-time signature scheme, smart grid, wide-area measurement system

Yee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic, Marimuthu Palaniswami

2013-05-01T23:59:59.000Z

189

Mobile one-time passwords: two-factor authentication using mobile phones  

Science Conference Proceedings (OSTI)

Static password authentication has security drawbacks. In two-factor authentication (2FA,) each user carries a device, called token, to generate passwords that are valid only one time. 2FA based on one-time passwords (OTPs) provides improved protection ... Keywords: nested hashing chain, one-time password, two-factor authentication

Mohamed Hamdy Eldefrawy; Muhammad Khurram Khan; Khaled Alghathbar; Tai-Hoon Kim; Hassan Elkamchouchi

2012-05-01T23:59:59.000Z

190

Biocatalysis - Biodegradation Database  

DOE Data Explorer (OSTI)

Ellis LBM, Roe D, Wackett LP (2006) "The University of Minnesota Biocatalysis-Biodegradation Database: The First Decade," Nucleic Acids Research 34: D517-D521.

Ellis, Lynda; Roe, Dave; Wackett, Lawrence

191

Central Internet Database (CID)  

Office of Environmental Management (EM)

RADCM-13 Reports Central Internet Database CID Photo Banner RADCM-13 Archived Reports By State California Adobe PDF Document Colorado Adobe PDF Document Idaho Adobe PDF Document...

192

Thermodynamic databases - TMS  

Science Conference Proceedings (OSTI)

Apr 8, 2008 ... Fe-DATA * Ni-DATA * NiFe-Super * Ti-DATA * TiAl-DATA Citation: " Thermodynamic databases," Thermotech Sente Software. Launch Site.

193

NPP Database Dictionary  

NLE Websites -- All DOE Office Websites (Extended Search)

All the terms used throughout the ORNL DAAC NPP Database (principally associated with sites in the grassland biome) are defined below. Since the field measurements were collected...

194

NIST Special Database 25  

Science Conference Proceedings (OSTI)

... recognition (OCR) results from a page with typesetting files for an entire book. ... volume of the database contains the pages of 20 books published in ...

2012-02-28T23:59:59.000Z

195

NIST Special Database 23  

Science Conference Proceedings (OSTI)

... NIST TREC Document Database: Disk 5. Rate our Products and Services. ... have all been compressed using the UNIX compress utility and are stored ...

2012-02-28T23:59:59.000Z

196

NIST Special Database 22  

Science Conference Proceedings (OSTI)

... NIST TREC Document Database: Disk 4. Rate our Products and Services. ... have all been compressed using the UNIX compress utility and are stored ...

2012-02-28T23:59:59.000Z

197

NIST Database Discalimer  

Science Conference Proceedings (OSTI)

... of Standards and Technology (NIST) uses its best efforts to deliver a high quality copy of the Database and to verify that the data contained therein ...

2010-10-05T23:59:59.000Z

198

An Overview of the Lawrence Berkeley Laboratory Extended Entity-Relationship Database Tools  

E-Print Network (OSTI)

In this overview we briefly describe a collection of tools developed at Lawrence Berkeley Laboratory (LBL) for aiding users in specifying database structures and in querying databases using object-oriented concepts on top of commercial relational database management systems. These tools are based on an Extended Entity-Relationship (EER) model and allow users to deal with concise EER structures and queries rather than relational database definitions and queries which are usually large, hard to maintain, and involve terms that obscure the semantics of the application. Using the LBL/EER database tools users are insulated from the underlying database management system, and thus can avoid learning database management specific concepts and query languages. 1 Introduction Database applications involve large amounts of data that must be maintained and made available to users for analysis and manipulation. Database management systems (DBMSs) provide the capabilities required for stor...

Victor M. Markowitz; Arie Shoshani

1993-01-01T23:59:59.000Z

199

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network (OSTI)

This study examined the Texas Renaissance Festival as perceived and experienced by (serious) visitors for whom this was a form of regular, repeated and highly meaningful participation. Specifically, the focus was to gain understanding of the notion of serious leisure as defined by Stebbins, in the context of festivals, and to understand the meanings associated with festival participation. Following a qualitative (constructivism paradigm) research frame, the data were collected through participant observation and 37 in-depth interviews for highly committed tourists to the Texas Renaissance Festival. The collected data were analyzed through Grounded Theory techniques specified by Glaser (1978). In regard to the characteristics of participation, the results indicated that their continuous participation in the Texas Renaissance Festival displays qualities of serious leisure: 1) identification; 2) long-term career; 3) unique ethos; 4) significant personal effort; 5) perseverance; and 6) durable personal benefits. As they become more seriously involved in the festival participation, they tend to be a part of a well-integrated subculture of which prominent values include personal freedom, hedonism, and anti-materialism. The experiences constructed through the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search of such authentic experiences at the festival seems to be partly driven by the perceived alienation in everyday life. When these aspects were examined from an interpretive and meaning-based approach, attending the festival in a serious manner is not just a simple matter of escaping from the reality (e.g., alienation) of everyday life, but is an active quest for an ?alternative? to their lives at home as many indicated. Thus, the serious participation in a tourism activity such as the Texas Renaissance Festival could be best understood as a dynamic process of attaining existential state of Being in response to diverse sociocultural conditions. Several significant theoretical propositions were made based on the results derived from this study. Additionally, marketing and management implications associated with staging tourism events and festivals were discussed.

Kim, Hyounggon

2004-12-01T23:59:59.000Z

200

Acting Associate State Director Authenticated by  

E-Print Network (OSTI)

Purpose: Provide updated planning procedures, role definitions, review responsibilities, and other guidance for land use planning in Oregon and Washington. Policy/Action: The attached 1601 Manual Supplement supersedes the Oregon State Manual Supplement 1631, Program Management, release 1-315, dated 03/06/2003. Timeframe: This guidance is in effect immediately. Background: This manual supplement release prescribes standards for preparing and reviewing resource management plans (RMPs), amendments and revisions, documenting plan monitoring and maintenance, and conducting periodic evaluations in Oregon and Washington. It establishes procedures and roles for quality assurance in the planning and related environmental analyses processes. It establishes planning areas when current or proposed resource management planning areas are not expected to coincide with resource area boundaries. It clarifies field office authority for initiation of plan revisions or amendments, including amendments which are integrated with implementation or activity level actions. It prescribes minimum records submission, retention, and posting for plans and supporting records.

Branch Chiefs; Cathy L. Harris; Rhondalyn J. Darnell

1969-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

"Cut me some slack": latency-aware live migration for databases  

Science Conference Proceedings (OSTI)

Cloud-based data management platforms often employ multitenant databases, where service providers achieve economies of scale by consolidating multiple tenants on shared servers. In such database systems, a key functionality for service providers is database ... Keywords: PID controller, cloud computing, control theory, database migration, multitenancy

Sean Barker; Yun Chi; Hyun Jin Moon; Hakan Hacigümü?; Prashant Shenoy

2012-03-01T23:59:59.000Z

202

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

203

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

204

Security problems with a chaos-based deniable authentication scheme  

E-Print Network (OSTI)

Recently, a new scheme was proposed for deniable authentication. Its main originality lied on applying a chaos-based encryption-hash parallel algorithm and the semi-group property of the Chebyshev chaotic map. Although original and practicable, its insecurity and inefficiency are shown in this paper, thus rendering it inadequate for adoption in e-commerce.

G. Alvarez

2004-12-09T23:59:59.000Z

205

Secure RFID authentication scheme for EPC class Gen2  

Science Conference Proceedings (OSTI)

Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the essential technology called "ad hoc network" and the "RFID technology" required by a ubiquitous environment. Therefore, ... Keywords: RFID, authentication, security

Dae-Hee Seo; Jang-Mi Baek; Dong-sub Cho

2009-02-01T23:59:59.000Z

206

Undercover: authentication usable in front of prying eyes  

Science Conference Proceedings (OSTI)

A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the design, implementation, and evaluation of a novel class of user authentication ... Keywords: multisensory processes, security, usability

Hirokazu Sasamoto; Nicolas Christin; Eiji Hayashi

2008-04-01T23:59:59.000Z

207

Mobile token-based authentication on a budget  

Science Conference Proceedings (OSTI)

We propose a light-weight, cheap authentication device for unlocking a user's smartphone. The device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a device that works with ...

Hristo Bojinov; Dan Boneh

2011-03-01T23:59:59.000Z

208

database | OpenEI  

Open Energy Info (EERE)

database database Dataset Summary Description The Southern Methodist University (SMU) Geothermal Laboratory's database consists of primarily regional or background wells that determine the heat flow for the United States; temperature gradients and conductivity are used to generate heat flow measurements; some wells close together have been averaged; wells within geothermal anomalies are located, but not utilized in the regional analysis.Database includes: latitude/longitude, township/range, AMS sheet, well depth, elevation, max./min. temp, BHT, gradient(s), thermal conductivity, Source SMU Date Released Unknown Date Updated Unknown Keywords Alabama database geothermal SMU Data application/vnd.ms-excel icon Alabama geothermal data 2008 (xls, 19.5 KiB) Quality Metrics

209

Harvesting covert networks: a case study of the iMiner database  

Science Conference Proceedings (OSTI)

Data collection of covert networks is an inherently difficult task because of the very nature of these networks. Researchers find it difficult to locate and access data relating to the structure and function of such networks in order to study this extreme ... Keywords: Al Qaeda, Global Terrorism Database, MIPT Terrorism Knowledge Base, RAND Worldwide Terrorism Incident Database, Terrorism Knowledge Portal, authenticated websites, covert networks, data analysis, iMiner, information harvesting, intelligence agencies, internet, investigative data mining, online organisations, open source intelligence, social network analysis, terrorists, virtual organisations, web based organisations, web mining, world wide web

Nasrullah Memon; Uffe Kock Wiil; Reda Alhajj; Claus Atzenbeck; Nicholas Harkiolakis

2011-11-01T23:59:59.000Z

210

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

NLE Websites -- All DOE Office Websites (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

211

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

212

Hazard Analysis Database Report  

Science Conference Proceedings (OSTI)

The Hazard Analysis Database was developed in conjunction with the hazard analysis activities conducted in accordance with DOE-STD-3009-94, Preparation Guide for US Department of Energy Nonreactor Nuclear Facility Safety Analysis Reports, for the Tank Waste Remediation System (TWRS) Final Safety Analysis Report (FSAR). The FSAR is part of the approved TWRS Authorization Basis (AB). This document describes, identifies, and defines the contents and structure of the TWRS FSAR Hazard Analysis Database and documents the configuration control changes made to the database. The TWRS Hazard Analysis Database contains the collection of information generated during the initial hazard evaluations and the subsequent hazard and accident analysis activities. The database supports the preparation of Chapters 3,4, and 5 of the TWRS FSAR and the USQ process and consists of two major, interrelated data sets: (1) Hazard Evaluation Database--Data from the results of the hazard evaluations; and (2) Hazard Topography Database--Data from the system familiarization and hazard identification.

GAULT, G.W.

1999-10-13T23:59:59.000Z

213

Hazard Analysis Database Report  

Science Conference Proceedings (OSTI)

The Hazard Analysis Database was developed in conjunction with the hazard analysis activities conducted in accordance with DOE-STD-3009-94, Preparation Guide for U S . Department of Energy Nonreactor Nuclear Facility Safety Analysis Reports, for HNF-SD-WM-SAR-067, Tank Farms Final Safety Analysis Report (FSAR). The FSAR is part of the approved Authorization Basis (AB) for the River Protection Project (RPP). This document describes, identifies, and defines the contents and structure of the Tank Farms FSAR Hazard Analysis Database and documents the configuration control changes made to the database. The Hazard Analysis Database contains the collection of information generated during the initial hazard evaluations and the subsequent hazard and accident analysis activities. The Hazard Analysis Database supports the preparation of Chapters 3 ,4 , and 5 of the Tank Farms FSAR and the Unreviewed Safety Question (USQ) process and consists of two major, interrelated data sets: (1) Hazard Analysis Database: Data from the results of the hazard evaluations, and (2) Hazard Topography Database: Data from the system familiarization and hazard identification.

GRAMS, W.H.

2000-12-28T23:59:59.000Z

214

Central Internet Database (CID) Glossary  

Office of Environmental Management (EM)

Glossary Glossary Central Internet Database CID Photo Banner Glossary # | A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z # 11e(2) Byproduct Material Tailings or waste produced by the extraction or concentration of uranium or thorium from any ore processed primarily for its source material (i.e., uranium or thorium) content. This excludes underground ores depleted by uranium solution extraction operations (in situ leaching) that continue to remain underground. 11e(2) byproduct material is defined by law under Section 11e(2) of the Atomic Energy Act as amended by Title II of the Uranium Mill Tailings Radiation Control Act of 1978. A Active Facility A facility that is being used to conduct DOE missions and has not yet been transferred to the Office of Environmental Management (EM) for management and/or cleanup.

215

2010 Worldwide Gasification Database  

DOE Data Explorer (OSTI)

The 2010 Worldwide Gasification Database describes the current world gasification industry and identifies near-term planned capacity additions. The database lists gasification projects and includes information (e.g., plant location, number and type of gasifiers, syngas capacity, feedstock, and products). The database reveals that the worldwide gasification capacity has continued to grow for the past several decades and is now at 70,817 megawatts thermal (MWth) of syngas output at 144 operating plants with a total of 412 gasifiers. [Copied from http://www.netl.doe.gov/technologies/coalpower/gasification/worlddatabase/index.html

216

Development of KM System for Intergrated Management of Water Resources and Environment in Zhangweinan Subbasin, China  

Science Conference Proceedings (OSTI)

Knowledge Management (KM) system for Integrated Management of Water Resources and Environment is developed in the paper, which includes spatial database, properties database, thematic database and met abase. The database can be used for integrated management ... Keywords: Zhangweinan Subbasin, knowledge management system(KM), database

Weidong Yu; Chunhui Li; Junxiang Jia

2012-05-01T23:59:59.000Z

217

A software development tool for improving quality of service in distributed database systems  

Science Conference Proceedings (OSTI)

The Distributed Database Management Systems (DDBMS) are measured by their Quality of Service (QoS) improvements on the real world applications. To analyze the behavior of the distributed database system and to measure its quality of service performance, ...

Ismail Omar Hababeh

2009-12-01T23:59:59.000Z

218

Demand Response Database & Demo  

NLE Websites -- All DOE Office Websites (Extended Search)

Demand Response Database & Demo Speaker(s): Mike Graveley William M. Smith Date: June 7, 2005 - 12:00pm Location: Bldg. 90 Seminar HostPoint of Contact: Mary Ann Piette Infotility...

219

Nuclear Science References Database  

E-Print Network (OSTI)

The Nuclear Science References (NSR) database together with its associated Web interface, is the world's only comprehensive source of easily accessible low- and intermediate-energy nuclear physics bibliographic information for more than 210,000 articles since the beginning of nuclear science. The weekly-updated NSR database provides essential support for nuclear data evaluation, compilation and research activities. The principles of the database and Web application development and maintenance are described. Examples of nuclear structure, reaction and decay applications are specifically included. The complete NSR database is freely available at the websites of the National Nuclear Data Center http://www.nndc.bnl.gov/nsr and the International Atomic Energy Agency http://www-nds.iaea.org/nsr.

B. Pritychenko; E. B?ták; B. Singh; J. Totans

2013-02-27T23:59:59.000Z

220

ARTI Refrigerant Database  

Science Conference Proceedings (OSTI)

The Refrigerant Database consolidates and facilitates access to information to assist industry in developing equipment using alternative refrigerants. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

Calm, J.M. [Calm (James M.), Great Falls, VA (United States)

1994-05-27T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Hardware device to physical structure binding and authentication  

Science Conference Proceedings (OSTI)

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

222

Crude Oil Analysis Database  

DOE Data Explorer (OSTI)

The composition and physical properties of crude oil vary widely from one reservoir to another within an oil field, as well as from one field or region to another. Although all oils consist of hydrocarbons and their derivatives, the proportions of various types of compounds differ greatly. This makes some oils more suitable than others for specific refining processes and uses. To take advantage of this diversity, one needs access to information in a large database of crude oil analyses. The Crude Oil Analysis Database (COADB) currently satisfies this need by offering 9,056 crude oil analyses. Of these, 8,500 are United States domestic oils. The database contains results of analysis of the general properties and chemical composition, as well as the field, formation, and geographic location of the crude oil sample. [Taken from the Introduction to COAMDATA_DESC.pdf, part of the zipped software and database file at http://www.netl.doe.gov/technologies/oil-gas/Software/database.html] Save the zipped file to your PC. When opened, it will contain PDF documents and a large Excel spreadsheet. It will also contain the database in Microsoft Access 2002.

Shay, Johanna Y.

223

Defining the questions: a research agenda for nontraditional authentication in arms control  

Science Conference Proceedings (OSTI)

Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

Hauck, Danielle K [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; Smith, Morag K [Los Alamos National Laboratory; Thron, Jonathan L [Los Alamos National Laboratory; Budlong - Sylvester, Kory [Los Alamos National Laboratory

2010-01-01T23:59:59.000Z

224

Target Database | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Science & Engineering Applications Target Database The Target database and analytical pipeline provides bioinformatics support and selection of protein targets of biomedical...

225

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

226

Compression and query execution within column oriented databases  

E-Print Network (OSTI)

Compression is a known technique used by many database management systems ("DBMS") to increase performance[4, 5, 14]. However, not much research has been done in how compression can be used within column oriented architectures. ...

Ferreira, Miguel C. (Miguel Cacela Rosa Lopes Ferreira)

2005-01-01T23:59:59.000Z

227

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... responsible to executive-level management (eg, the Chief Information Officer) for the ... entity information, keys, and metadata into a database used by ...

2013-08-15T23:59:59.000Z

228

Management Information Reporting Procedures  

Science Conference Proceedings (OSTI)

... but are not limited to assistance in developing environmental management systems, improving ... with a client that is already in the database, there is ...

2010-07-01T23:59:59.000Z

229

Critical database technologies for high energy physics  

SciTech Connect

A number of large-scale high energy physics experiments loom on the horizon, several of which will generate many petabytes of scientific data annually. A variety of exploratory projects are underway within the physics computing community to investigate approaches to managing the data. There are conflicting views of this massive data problem: (1) there is far too much data to manage effectively within a genuine database; (2) there is far too much data to manage effectively without a genuine database; and many people hold both views. The purpose of this paper is to begin a dialog between the computational physics and very large database community on such problems, and to simulate research in directions that will be of benefit to both groups. This paper will attempt to outline the nature and scope of these massive data problems, survey several of the approaches being explored by the physics community, and suggest areas in which high energy physicists hope to look to the database community for assistance.

Malon, D.M.; May, E.N.

1997-09-01T23:59:59.000Z

230

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-057: eXtplorer "ext_find_user()" Authentication Bypass V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug.

231

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

232

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

233

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

234

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct 5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks May 14, 2013 - 12:08am Addthis PROBLEM: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat SecurityTracker Alert ID: 1028534 CVE-2013-2067 IMPACT ASSESSMENT: High DISCUSSION: A remote user can repeatedly send a specially crafted request for a resource requiring authentication while the target user is completing the login form to cause the FORM authentication process to execute the remote user's request with the privileges of the target user.

235

ADANS database specification  

SciTech Connect

The purpose of the Air Mobility Command (AMC) Deployment Analysis System (ADANS) Database Specification (DS) is to describe the database organization and storage allocation and to provide the detailed data model of the physical design and information necessary for the construction of the parts of the database (e.g., tables, indexes, rules, defaults). The DS includes entity relationship diagrams, table and field definitions, reports on other database objects, and a description of the ADANS data dictionary. ADANS is the automated system used by Headquarters AMC and the Tanker Airlift Control Center (TACC) for airlift planning and scheduling of peacetime and contingency operations as well as for deliberate planning. ADANS also supports planning and scheduling of Air Refueling Events by the TACC and the unit-level tanker schedulers. ADANS receives input in the form of movement requirements and air refueling requests. It provides a suite of tools for planners to manipulate these requirements/requests against mobility assets and to develop, analyze, and distribute schedules. Analysis tools are provided for assessing the products of the scheduling subsystems, and editing capabilities support the refinement of schedules. A reporting capability provides formatted screen, print, and/or file outputs of various standard reports. An interface subsystem handles message traffic to and from external systems. The database is an integral part of the functionality summarized above.

1997-01-16T23:59:59.000Z

236

Solid Waste Projection Model: Database (Version 1. 3)  

SciTech Connect

The Solid Waste Projection Model (SWPM) system is an analytical tool developed by Pacific Northwest Laboratory (PNL) for Westinghouse Hanford Company (WHC). The SWPM system provides a modeling and analysis environment that supports decisions in the process of evaluating various solid waste management alternatives. This document, one of a series describing the SWPM system, contains detailed information regarding the software and data structures utilized in developing the SWPM Version 1.3 Database. This document is intended for use by experienced database specialists and supports database maintenance, utility development, and database enhancement.

Blackburn, C.L.

1991-11-01T23:59:59.000Z

237

Methods | Transparent Cost Database  

Open Energy Info (EERE)

Methods Methods Disclaimer The data gathered here are for informational purposes only. Inclusion of a report in the database does not represent approval of the estimates by DOE or NREL. Levelized cost calculations DO NOT represent real world market conditions. The calculation uses a single discount rate in order to compare technology costs only. About the Cost Database For emerging energy technologies, a variety of cost and performance numbers are cited in presentations and reports for present-day characteristics and potential improvements. Amid a variety of sources and methods for these data, the Office of Energy Efficiency and Renewable Energy's technology development programs determine estimates for use in program planning. The Transparent Cost Database collects program cost and performance

238

FORAST Database (DB1005)  

NLE Websites -- All DOE Office Websites (Extended Search)

Atmospheric Trace Gases » Ozone » FORAST Database Atmospheric Trace Gases » Ozone » FORAST Database FORAST Database DOI: 10.3334/CDIAC/vrc.db1005 data Data Investigators S. B. McLaughlin, D. J. Downing, T. J. Blasing, B. L. Jackson, D. J. Pack, D. N. Duvick, L. K. Mann, and T. W. Doyle Description The Forest Responses to Anthropogenic Stress (FORAST) project was designed (1) to determine whether evidence of alterations of long-term growth patterns of several species of eastern forest trees was apparent in tree-ring chronologies from within the region and (2) to identify environmental variables that were temporally or spatially correlated with any observed changes. The project was supported principally by the U.S. Environmental Protection Agency (EPA) with additional support from the National Park Service.

239

Complex Glazing Database  

NLE Websites -- All DOE Office Websites (Extended Search)

1.2 1.2 This is a Beta version of the Complex Glazing Database (CGDB) for WINDOW 6. The data in the list below was measured by LBNL for this first data set. In the future, LBNL will publish measurement and submittal procedures so that manufacturers can submit their own data to LBNL for review and inclusion in subsequent databases, in a similar fashion to the International Glazing Database (IGDB). The numbering scheme for each manufacturer is a Beta scheme and will be further developed in the next few months. Alkenz USA Inc Shading Material Name BSDF XML File Shading Layer Name ID Type Sunshadow 3000, N901 Charcoal (SA-31) 2011-SA31.XML Sunshadow 3000, N901 Charcoal (WS) 7000 BSDF File Sunshadow 3100, N002 white/bone (SA-30) 2011-SA30.XML Sunshadow 3100, N002 white/bone (WS)

240

National Ambient Radiation Database  

Science Conference Proceedings (OSTI)

The U.S. Environmental Protection Agency (EPA) recently developed a searchable database and website for the Environmental Radiation Ambient Monitoring System (ERAMS) data. This site contains nationwide radiation monitoring data for air particulates, precipitation, drinking water, surface water and pasteurized milk. This site provides location-specific as well as national information on environmental radioactivity across several media. It provides high quality data for assessing public exposure and environmental impacts resulting from nuclear emergencies and provides baseline data during routine conditions. The database and website are accessible at www.epa.gov/enviro/. This site contains (1) a query for the general public which is easy to use--limits the amount of information provided, but includes the ability to graph the data with risk benchmarks and (2) a query for a more technical user which allows access to all of the data in the database, (3) background information on ER AMS.

Dziuban, J.; Sears, R.

2003-02-25T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

ARTI Refrigerant Database  

Science Conference Proceedings (OSTI)

The Refrigerant Database consolidates and facilitates access to information to assist industry in developing equipment using alternative refrigerants. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air- conditioning and refrigeration equipment. The complete documents are not included, though some may be added at a later date. The database identifies sources of specific information on R-32, R-123, R-124, R- 125, R-134a, R-141b, R142b, R-143a, R-152a, R-290 (propane), R-717 (ammonia), ethers, and others as well as azeotropic and zeotropic blends of these fluids. It addresses polyalkylene glycol (PAG), ester, and other lubricants. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits.

Calm, J.M.

1992-04-30T23:59:59.000Z

242

The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity  

E-Print Network (OSTI)

Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst clergy and how it may differ from the emotional labor experienced in other occupations, with the premise that individuals have multiple identities that shift and change depending on the situational context. A thematic analysis of interviews conducted with twenty-seven clergy and a textual analysis of denominational/church texts was conducted to examine the following ideas: 1) how clergy negotiated tensions of authenticity and identity in their work; 2) how clergy described the spiritual and emotional dimensions of their work; 3) how denominational texts address issues of spiritual and emotional labor; and, 4) if clergy felt enabled and/or constrained by denominational standards and beliefs. The results of this study indicated that emotional and spiritual labor amongst clergy is unique for several reasons. One, the emotional labor clergy engaged in served a positive function because they see it as means of helping others. Second, clergy were aware that emotional labor was intrinsic to the job and they engaged in activities to preempt or manage the tension they felt when the job required them to mask their true feelings and display organizationally preferred feelings. Finally, clergy enjoyed the spiritual dimension of their jobs; thus they were engaged in spiritual work (authentic spirituality), not spiritual labor (inauthentic spirituality). Results also indicated that denominational texts did convey a preferred identity or ideal for how pastors should behave. Pastors indicated that the denominational expectations and guidelines for pastors both enabled and constrained them. The majority of the pastors felt the freedom to disagree civilly and the denomination/church provided venues in which pastors could communicate their dissenting views. However, in some cases, pastors felt the denominational guidelines for the "ideal pastor" were in conflict with how they saw their own role as pastor and they left the denomination. Results also revealed how pastors‘ identities shifted and changed as the context in which they were ministering changed.

Otey, Penny Addison

2010-08-01T23:59:59.000Z

243

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuration Manager Database Authentication Bypass Vulnerability V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control...

244

Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols  

E-Print Network (OSTI)

Recently, Al-Riyami and Paterson [1] proposed four authenticated tripartite key agreement protocols which make use of Weil pairing. In this paper, we show...

Kyungah Shim

2003-01-01T23:59:59.000Z

245

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents (OSTI)

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2001-01-01T23:59:59.000Z

246

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents (OSTI)

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

247

V-236: MediaWiki CentralAuth Extension Authentication Bypass...  

NLE Websites -- All DOE Office Websites (Extended Search)

IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by...

248

Group key management  

SciTech Connect

This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

Dunigan, T.; Cao, C.

1997-08-01T23:59:59.000Z

249

Recreation Information Database - RIDB | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Recreation Information Database - RIDB Recreation Information Database - RIDB Agriculture Community Menu DATA APPS EVENTS DEVELOPER STATISTICS COLLABORATE ABOUT Agriculture You are here Data.gov » Communities » Agriculture » Data Recreation Information Database - RIDB Dataset Summary Description XML extractable listing of US Gov't Recreation sites Tags {recreation,camping,hiking,"visitor center","forest service","us army corps of engineers","national park service","bureau of reclamation","bureau of land management","fish and wildlife"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated Jun-09 Publisher US Forest Service, Department of Agriculture

250

Western Area Power Administration customer database  

SciTech Connect

This report describes a comprehensive customer database compiled by the Pacific Northwest Laboratory (PNL) to assist with analyses conducted as part of the Western Area Power Administration Energy Planning and Management Program Environmental Impact Statement (EIS). The database was used by PNL as a tool to help select a sample of Western customers for potential participation in the Organizational Impacts Analysis case studies, and was used as part of the Utility Impact Analysis to identify sources and costs of auxiliary power. Secondary information sources were used predominantly to compile one year of system related information on the Western customers (over 600) included in the database. This information was useful for its intended purposes; however, year-to-year information may not be consistent across utilities and not all information was available for each utility.

Sandahl, L.J.; Lee, A.D.; Wright, G.A.; Durfee, D.L.

1993-05-01T23:59:59.000Z

251

LHCb Conditions Database Operation Assistance Systems  

E-Print Network (OSTI)

The Conditions Database of the LHCb experiment (CondDB) provides versioned, time dependent geometry and conditions data for all LHCb data processing applications (simulation, high level trigger, reconstruction, analysis) in a heterogeneous computing environment ranging from user laptops to the HLT farm and the Grid. These different use cases impose front-end support for multiple database technologies (Oracle and SQLite are used). Sophisticated distribution tools are required to ensure timely and robust delivery of updates to all environments. The content of the database has to be managed to ensure that updates are internally consistent and externally compatible with multiple versions of the physics application software. In this paper we describe three systems that we have developed to address these issues: - an extension to the automatic content validation done by the “Oracle Streams” replication technology, to trap cases when the replication was unsuccessful; - an automated distribution process for the S...

Shapoval, Illya

2012-01-01T23:59:59.000Z

252

Central Internet Database (CID) Reports  

Office of Environmental Management (EM)

Home > CID Reports Home > CID Reports Central Internet Database CID Photo Banner Reports The CID offers a choice of standard and archived reports. Standard reports are based on the most recently available DOE data related to the information requirements specified in the Settlement Agreement. Report categories include: Radioactive Waste Spent Nuclear Fuel and High-Level Radioactive Waste Facilities Non-Radioactive Hazardous Waste Toxic Release Inventory Waste The standard reports menu includes reports generated directly by the CID and reports generated by other systems. The CID generated reports allow users to select criteria to customize the report output. For the most current radioactive waste reports, CID users are directed to the Waste Information Management System (WIMS) Exit CID Website . WIMS provides radioactive waste disposition reports and disposition maps. While WIMS is a public site, you need to register and provide contact information the first time you enter WIMS.

253

Draft Special Publication 800-63-2, Electronic Authentication ...  

Science Conference Proceedings (OSTI)

... For example, password database entries are considered to be credentials for the purpose of this document but are possessed by the Verifier. ...

2013-04-25T23:59:59.000Z

254

The Design and Development of RDGSM Isotope Database Based on J2ME/J2EE  

Science Conference Proceedings (OSTI)

RDGSM(the Regional Database for Geothermal Surface Manifestation) is a distributed database designed for IAEA which used to manage isotope and hydrology data in asian-pacific region. The data structure of RDGSM is introduced in the paper. An mobile database ... Keywords: Isotope, Mobile Database, Model-View-Controller

Shumin Zhou; Bin Tang; Daning Liang

2009-10-01T23:59:59.000Z

255

Buffer management in relational database systems  

Science Conference Proceedings (OSTI)

The hot-set model, characterizing the buffer requirements of relational queries, is presented. This model allows the system to determine the optimal buffer space to be allocated to a query; it can also be used by the query optimizer to derive efficient ...

Giovanni Maria Sacco; Mario Schkolnick

1986-12-01T23:59:59.000Z

256

Moving Objects Information Management: The Database Challenge  

Science Conference Proceedings (OSTI)

Miniaturization of computing devices, and advances in wireless communication and sensor technology are some of the forces that are propagating computing from the stationary desktop to the mobile outdoors. Some important classes of new applications that ...

Ouri Wolfson

2002-06-01T23:59:59.000Z

257

Leveraging Personal Devices for Stronger Password Authentication from Untrusted Computers  

E-Print Network (OSTI)

Internet authentication for popular end-user transactions, such as online banking and e-commerce, continues to be dominated by passwords entered through end-user personal computers (PCs). Most users continue to prefer (typically untrusted) PCs over smaller personal devices for actual transactions, due to usability features related to keyboard and screen size. However most such transactions and their existing underlying protocols are vulnerable to attacks including keylogging, phishing, and pharming, which can extract user identity and sensitive account information allowing account access. We propose a simple approach to counter such attacks, which cryptographically separates a user’s long-term secret input (typically low-entropy password) from the client PC. The latter continues to be used for most of the interaction and computations but has access only to temporary secrets, while the user’s long-term secret is input through an independent personal trusted device such as a cellphone which makes it available to the PC only after encryption under the intended far-end recipient’s public key. Our proposal is intended to safeguard passwords from the attacks mentioned above, as well as to provide transaction security to foil session hijacking. To facilitate a comparison to our proposal, we also provide a comprehensive survey of web authentication techniques that use an additional factor of authentication such as a cellphone, PDA (personal digital assistant) or hardware token; this survey may be of independent interest. A proof sketch of MP-Auth using the Protocol Composition Logic (PCL) is also provided.

Mohammad Mannan; P. C. van Oorschot

2008-01-01T23:59:59.000Z

258

Final report and recommendations of the ESnet Authentication Pilot Project  

Science Conference Proceedings (OSTI)

To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

1995-01-01T23:59:59.000Z

259

Transformer Industry-wide Database: Equipment Performance and Failure Database Analysis - Status Update  

Science Conference Proceedings (OSTI)

The Electric Power Research Institute's (EPRI's) Transformer Industry-Wide Database (IDB) is a collaborative effort to pool appropriate transformer operating and failure data in order to assemble a statistically valid population of many types of power transformers. Analysis of these data will provide information about transformer historical performance and models for projecting future performance that will be useful for aiding both asset management and maintenance managers. This report presents the curre...

2011-12-19T23:59:59.000Z

260

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

BABAR Web job submission with Globus Authentication and AFS Access  

Science Conference Proceedings (OSTI)

We present two versions of a grid job submission system produced for the BaBar experiment. Both use globus job submission to process data spread across various sites, producing output which can be combined for analysis. The problems encountered with authorization and authentication, data location, job submission, and the input and output sandboxes are described, as are the solutions. The total system is still some way short of the aims of enterprises such as the EDG, but represent a significant step along the way.

Forti, Alessandra

2003-06-17T23:59:59.000Z

262

National Vulnerability Database Home  

Science Conference Proceedings (OSTI)

... August 6, 2007: A US Office of Management and Budget memorandum requires specific secure configuration settings for Microsoft operating ...

263

Geographic Information System (GIS) Database Development, Integration, and Maintenance for the Iowa Department of  

E-Print Network (OSTI)

Geographic Information System (GIS) Database Development, Integration, and Maintenance for the Iowa-related fields. #12;Geographic Information System (GIS) Database Development, Integration, and Maintenance to limit data management and maintenance in the central office. A single database table would exist

Beresnev, Igor

264

UK Windspeed Reference/Archival Database The windspeed database...  

Open Energy Info (EERE)

UK Windspeed ReferenceArchival Database The windspeed database provides estimates of mean annual wind speed throughout the UK, averaged over a 1-kilometer square area, at each of...

265

Central Internet Database (CID) Related Links  

Office of Environmental Management (EM)

Related Links Related Links Central Internet Database CID Photo Banner Links to Waste and Materials Disposition Information Below is a collection of reports and links to various documents that provide information related to waste and material disposition. While most of these are directly related to the Department of Energy's waste management activities, some links include information from the commercial sector. Some of the information provides an historical context for current waste disposition alternatives. To view PDF documents, please ensure Adobe Reader is installed on your computer, it is available to download here Exit CID Website . Waste Volume Related Databases For DOE/EM waste and material stream data: Waste Information Management System (WIMS) provided by Florida International University Exit CID Website

266

A framework for federated two-factor authentication enabling cost-effective secure access to distributed cyberinfrastructure  

Science Conference Proceedings (OSTI)

As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus ... Keywords: OTP, XSEDE, authentication, radius

Matthew A. Ezell; Gary L. Rogers; Gregory D. Peterson

2012-07-01T23:59:59.000Z

267

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network (OSTI)

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

268

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

Perrig, Adrian

269

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME  

E-Print Network (OSTI)

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

270

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

Perrig, Adrian

271

Security Analysis of Lightweight Authentication Protocol from WISTP 2013 Wang Shao-HuiP  

E-Print Network (OSTI)

Security Analysis of Lightweight Authentication Protocol from WISTP 2013 Wang Shao-HuiP 1,2,3) P Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China) P 3) P( Network and Data Security Frequency Identification (RFID) is security and privacy. Many RFID authentication protocols have been

International Association for Cryptologic Research (IACR)

272

Attacks and improvements to an RIFD mutual authentication protocol and its extensions  

Science Conference Proceedings (OSTI)

In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also extended this protocol for RFID tag ownership transfer. These two protocols are designed to have the most security properties in the literature. We discover that, ... Keywords: authentication, privacy, rfid, security

Shaoying Cai; Yingjiu Li; Tieyan Li; Robert H. Deng

2009-03-01T23:59:59.000Z

273

Transaction-based authentication and key agreement protocol for inter-domain VoIP  

Science Conference Proceedings (OSTI)

We present an authentication and key agreement protocol to secure Voice over IP call establishment between interconnection proxies of different domains. The protocol operates on a transaction basis. Each transaction is defined as the set of operations ... Keywords: Authentication, DDoS Protection, Inter-domain VoIP, Synchronisation, VoIP security

Patrick Battistello; Joaquin Garcia-Alfaro; Cyril DeléTré

2012-09-01T23:59:59.000Z

274

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network (OSTI)

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

275

Industry-Wide Database: Circuit Breakers  

Science Conference Proceedings (OSTI)

Best practice maintenance and asset management decisions are based on risks associated with actual equipment condition and performance. However, little effort has been made to systematically collect and analyze such industry information for high-voltage circuit breakers. This document presents the results of the initial effort of the Electric Power Research Institute (EPRI) to explore the development of an industry-wide database (IDB) for high-voltage circuit breakers (HVCBs). The project identified ...

2012-12-12T23:59:59.000Z

276

Anual Energy Database  

NLE Websites -- All DOE Office Websites (Extended Search)

Annual Energy Database Annual Energy Database Over the past several years, the National Fenestration Rating Council (NFRC) has developed technical procedures for determining the thermal performance properties of fenestration products. These properties document the thermal performance of the product in response to specific physical effects. U-factors define heat transfer as a function of temperature differences, Solar Heat Gain Coefficients are the fraction of incident solar radiation transmitted into the space, and Air Infiltration measures heat transfer as a function of a pressure differential. For the consumer or lay-person looking to understand the energy (heating and/or cooling) impacts of specific windows in typical residential applications, and to select an appropriate window for their application,

277

ARTI Refrigerant Database  

Science Conference Proceedings (OSTI)

The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air- conditioning and refrigeration equipment. The database identifies sources of specific information on R-32, R-123, R-124, R-125, R-134, R-134a, R-141b, R-142b, R-143a, R-152a, R-245ca, R-290 (propane), R- 717 (ammonia), ethers, and others as well as azeotropic and zeotropic and zeotropic blends of these fluids. It addresses lubricants including alkylbenzene, polyalkylene glycol, ester, and other synthetics as well as mineral oils. It also references documents on compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. A computerized version is available that includes retrieval software.

Calm, J.M.

1992-11-09T23:59:59.000Z

278

Cryptographic Key Management Workshop 2009 - A Holistic ...  

Science Conference Proceedings (OSTI)

... policies Board of Directors CEO Protect critical data CSO/CISO CIO We aren't ... Encrypted Database Management Encrypted Tape Key Management ...

2012-05-07T23:59:59.000Z

279

Buildings Performance Database  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Buildings Performance DOE Buildings Performance Database Paul Mathew Lawrence Berkeley National Laboratory pamathew@lbl.gov (510) 486 5116 April 3, 2013 Standard Data Spec API 2 | Building Technologies Office eere.energy.gov Purpose & Objectives Problem Statement: * Large-scale high-quality empirical data on building energy performance is critical to support decision- making and increase confidence in energy efficiency investments. * While there are a many potential sources for such data,

280

ARTI refrigerant database  

Science Conference Proceedings (OSTI)

The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

Calm, J.M.

1996-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

ARTI refrigerant database  

Science Conference Proceedings (OSTI)

The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilities access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

Calm, J.M. [Calm (James M.), Great Falls, VA (United States)] [Calm (James M.), Great Falls, VA (United States)

1999-01-01T23:59:59.000Z

282

ARTI refrigerant database  

Science Conference Proceedings (OSTI)

The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

Calm, J.M.

1996-11-15T23:59:59.000Z

283

ARTI refrigerant database  

Science Conference Proceedings (OSTI)

The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alterative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air-conditioning and refrigeration equipment. The complete documents are not included, though some may be added at a later date. The database identifies sources of specific information on various refrigerants. It addresses lubricants including alkylbenzene, polyalkylene glycol, polyolester, and other synthetics as well as mineral oils. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. Incomplete citations or abstracts are provided for some documents. They are included to accelerate availability of the information and will be completed or replaced in future updates.

Calm, J.M.

1997-02-01T23:59:59.000Z

284

ARTI Refrigerant Database  

SciTech Connect

The Refrigerant Database consolidates and facilitates access to information to assist industry in developing equipment using alternative refrigerants. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air-conditioning and refrigeration equipment. The complete documents are not included. The database identifies sources of specific information on R-32, R-123, R-124, R-125, R-134, R-134a, R-141b, R-142b, R-143a, R-152a, R-245ca, R-290 (propane), R-717 (ammonia), ethers, and others as well as azeotropic and zeotropic blends of these fluids. It addresses lubricants including alkylbenzene, polyalkylene glycol, ester, and other synthetics as well as mineral oils. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. Incomplete citations or abstracts are provided for some documents to accelerate availability of the information and will be completed or replaced in future updates.

Cain, J.M. (Calm (James M.), Great Falls, VA (United States))

1993-04-30T23:59:59.000Z

285

Commercial equipment cost database  

SciTech Connect

This report, prepared for DOE, Office of Codes and Standards, as part of the Commercial Equipment Standards Program at Pacific Northwest Laboratory, specifically addresses the equipment cost estimates used to evaluate the economic impacts of revised standards. A database including commercial equipment list prices and estimated contractor costs was developed, and through statistical modeling, estimated contractor costs are related to equipment parameters including performance. These models are then used to evaluate cost estimates developed by the ASHRAE 90.1 Standing Standards Project Committee, which is in the process of developing a revised ASHRAE 90.1 standard. The database will also be used to support further evaluation of the manufacturer and consumer impacts of standards. Cost estimates developed from the database will serve as inputs to economic modeling tools, which will be used to estimate these impacts. Preliminary results suggest that list pricing is a suitable measure from which to estimate contractor costs for commercial equipment. Models developed from these cost estimates accurately predict estimated costs. The models also confirm the expected relationships between equipment characteristics and cost. Cost models were developed for gas-fired and electric water heaters, gas-fired packaged boilers, and warm air furnaces for indoor installation. Because of industry concerns about the use of the data, information was not available for the other categories of EPAct-covered equipment. These concerns must be addressed to extend the analysis to all EPAct equipment categories.

Freeman, S.L.

1995-01-01T23:59:59.000Z

286

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM solidDB Password Hash Authentication Bypass 94: IBM solidDB Password Hash Authentication Bypass Vulnerability T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability April 4, 2011 - 6:08am Addthis PROBLEM: A vulnerability has been reported in IBM solidDB, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: IBM solidDB 4.x - IBM solidDB 6.x ABSTRACT: This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability. REFERENCE LINKS: IBM Security Alert Secunia Advisory: SA44030 ZDI Advisory: ZDI-11-115 IBM solidDB Support IMPACT ASSESSMENT: Medium Discussion: The specific flaw exists within the solid.exe process which listens by default on TCP ports 1315, 1964 and 2315. The authentication protocol

287

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

288

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

289

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

290

The Comprehensive Pacific Rainfall Database  

Science Conference Proceedings (OSTI)

This paper describes the Comprehensive Pacific Rainfall Database (PACRAIN), which contains daily and monthly precipitation records from the tropical Pacific basin. The database is a collection of observations from a variety of sources, including ...

J. Scott Greene; Michael Klatt; Mark Morrissey; Susan Postawko

2008-01-01T23:59:59.000Z

291

A Case for Database Filesystems  

SciTech Connect

Data intensive science is offering new challenges and opportunities for Information Technology and traditional relational databases in particular. Database filesystems offer the potential to store Level Zero data and analyze Level 1 and Level 3 data within the same database system [2]. Scientific data is typically composed of both unstructured files and scalar data. Oracle SecureFiles is a new database filesystem feature in Oracle Database 11g that is specifically engineered to deliver high performance and scalability for storing unstructured or file data inside the Oracle database. SecureFiles presents the best of both the filesystem and the database worlds for unstructured content. Data stored inside SecureFiles can be queried or written at performance levels comparable to that of traditional filesystems while retaining the advantages of the Oracle database.

Adams, P A; Hax, J C

2009-05-13T23:59:59.000Z

292

Thermodynamic Database Population Software (DBCreate)  

Update Thermodynamic Databases for Modeling Geochemical Processes The DBCreate software quickly and accurately updates thermodynamic databases used in geochemical modeling, based on changes in temperatures and pressures. The software facilitates the ...

293

Fuel Cell Technologies Office: Databases  

NLE Websites -- All DOE Office Websites (Extended Search)

Efficiency and Renewable Energy Fuel Cell Technologies Office Databases The Fuel Cell Technologies Office is developing databases to make it easier for users to find up-to-date...

294

Standard Reference Databases Online Subscription  

Science Conference Proceedings (OSTI)

... Num. NIST ONLINE SUBSCRIPTION DATABASES. Price. SRD 202. NIST Web Thermo Tables, Version Lite - Individual License. $200. SRD 202. ...

2013-07-15T23:59:59.000Z

295

Open Calphad - Software and Databases  

Science Conference Proceedings (OSTI)

Since today all major thermodynamic software and databases are commercial this ... Relations of High Temperature Materials for Fossil Energy Applications.

296

Industry-wide Substation Equipment Performance and Failure Database - Enhancements  

Science Conference Proceedings (OSTI)

EPRIs Transformer Industrywide Database (IDB) is a collaborative effort to pool appropriate transformer operating and failure data in order to assemble a statistically valid population of many types of power transformers. Analysis of this data will provide information about transformer historical performance useful for aiding both asset management and maintenance management. This report presents the current status of the Transformer IDB development.

2009-12-23T23:59:59.000Z

297

openSourcePACS: An extensible infrastructure for medical image management  

E-Print Network (OSTI)

availability and transaction management (akin to standard database constructs). All errors in transmission

2007-01-01T23:59:59.000Z

298

Central Internet Database (CID) PEIS Settlement Information  

Office of Environmental Management (EM)

About the CID > PEIS About the CID > PEIS Settlement Agreement Information Requirements Central Internet Database CID Photo Banner PEIS Settlement Agreement Information Requirements Information Categories: Contaminated environmental media, contaminated facilities, and waste managed by the DOE Environmental Management (EM) program Contaminated facilities and waste generated or managed by the DOE Offices of Defense Programs (DP) Exit CID Website , Science (SC) Exit CID Website , and Nuclear Energy (NE) Exit CID Website . DOE-managed domestic/foreign research reactor spent nuclear fuel (spent fuel from commercial reactors is excluded ). Sites governed by Section 151(b) of the Nuclear Waste Policy Act (NWPA)* Adobe PDF Document Exit CID Website , as amended, upon the transfer of those sites to DOE ownership.

299

Buildings Performance Database Helps Building Owners, Investors...  

NLE Websites -- All DOE Office Websites (Extended Search)

Buildings Performance Database Helps Building Owners, Investors Evaluate Energy Efficient Buildings Buildings Performance Database June 2013 A new database of building features and...

300

Review: 3D geo-database research: Retrospective and future directions  

Science Conference Proceedings (OSTI)

3D geo-database research is a promising field to support challenging applications such as 3D urban planning, environmental monitoring, infrastructure management, and early warning or disaster management and response. In these fields, interdisciplinary ... Keywords: 3D GIS, Geo-data modelling, Geo-database, Information systems for geo- and environmental sciences

Martin Breunig; Sisi Zlatanova

2011-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Database Archiving: How to Keep Lots of Data for a Very Long Time, 1st edition  

Science Conference Proceedings (OSTI)

With the amount of data a business accumulates now doubling every 12 to 18 months, IT professionals need to know how to develop a system for archiving important database data, in a way that both satisfies regulatory requirements and is durable and secure. ... Keywords: Database Management, Information Management, Information Technology, Library & Information Science

Jack E. Olson

2008-11-01T23:59:59.000Z

302

INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7/2013 Page 1 7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS: ď‚· An EITS provided Exchange email account ď‚· A DOE issued HSPD-12 badge ď‚· DOEnet or Internet access and a supported web browser ď‚· A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be installed in order to read the HSPD-12 badge) HSPD-12 OWA LOGIN PROCEDURE: 1. Insert HSPD-12 badge into card reader

303

Holographic Labeling And Reading Machine For Authentication And Security Appications  

DOE Patents (OSTI)

A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

1999-07-06T23:59:59.000Z

304

Using the CIM Conceptualization in Autonomic System Management: the System Management Ontology Project  

E-Print Network (OSTI)

Using the CIM Conceptualization in Autonomic System Management: the System Management Ontology across multiple organizations. The CIM standard #12;schemas, on which system databases on CIM

Calvanese, Diego

305

Energy Efficient Cities Initiative Project Database | Open Energy  

Open Energy Info (EERE)

Energy Efficient Cities Initiative Project Database Energy Efficient Cities Initiative Project Database Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Energy Efficient Cities Initiative Project Database Agency/Company /Organization: Energy Sector Management Assistance Program of the World Bank Sector: Energy Focus Area: Energy Efficiency, Buildings, Industry Topics: Background analysis Resource Type: Dataset, Lessons learned/best practices, Case studies/examples Website: esmap.org/esmap/node/231 Country: India, South Africa, Colombia, China, United States, Mexico, Pakistan, Egypt, Brazil, New Zealand, Singapore, Japan, Australia UN Region: Northern Africa, Southern Africa, Central America, South America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Australia and New Zealand

306

A+M Collisional Databases in ALADDIN Format  

DOE Data Explorer (OSTI)

ALADDIN (A Labelled Atomic Data Interface) is a database system developed in order to provide a standard and flexible format and interface for the exchange and management of atomic, molecular and plasma-material interaction data of interest to fusion research. As part of the Atomic and Molecular Data Information System (AMDIS), introduced by the IAEA Atomic and Molecular Data Unit, the ALADDIN interface is available on-line. Twelve databases from DOE and IAEA sources are available from the CFADC website under the heading A+M Collisional Databases.

307

EEMIS data sector correspondence with conceptual database design  

SciTech Connect

The purpose of this report is fivefold: (1) it provides an introduction to database systems and critieria that are important in the selection of a commercial database management system; (2) it demonstrates that the mapping of the EEMIS data sector structure into the conceptual database model is complete and preserves the hierarchies implied by the EEMIS data structure; (3) it describes all fields and associated field lengths; (4) it provides accurate formulae for estimating the computer storage requirements for the conceptual models at the facility level; and (5) it provides the details of the storage requirements for oil refineries, petroleum crude storage facilities, natural gas transmission and distribution facilities, and company description records.

Croteau, K; Kydes, A S; Maier, D

1979-07-01T23:59:59.000Z

308

Building Technologies Office: Buildings Performance Database  

NLE Websites -- All DOE Office Websites (Extended Search)

on Twitter Bookmark Building Technologies Office: Buildings Performance Database on Google Bookmark Building Technologies Office: Buildings Performance Database on Delicious...

309

UK RE Planning Database Project: October, 2010 The Planning Database  

Open Energy Info (EERE)

with regular data to track progress towards achieving EU targets for electricity generation from renewable energy (RE) sources. Extracts from the database are available each...

310

Central Internet Database (CID) About the CID  

Office of Environmental Management (EM)

Home > About the CID Home > About the CID Central Internet Database CID Photo Banner About CID Overview Since its public release in 2000, the Central Internet Database (CID) has provided users with Department of Energy (DOE) waste management, cleanup, and facility information. The 2008 update of the CID is the first comprehensive update of the CID since its initial release. Several changes have been made in this new version of the CID. Most importantly the number and types of reports has been changed to reflect current DOE data collection. Also, in an effort to reduce redundancy with other DOE data reporting systems, the CID now directs users to other systems for radioactive waste information. Users will still be able to access the more detailed radioactive waste and contaminated media data previously featured in the CID by using the Archived Reports menu.

311

DOE Patents Database - FAQ's  

Office of Scientific and Technical Information (OSTI)

Frequently Asked Questions Frequently Asked Questions Why was this database developed and by whom? How is this collection different than the one at the United States Patent and Trademark Office? What are the criteria for including patent records in this collection? How do you determine these patents were sponsored by DOE? How many patents are in this collection? Does the collection include all of DOE's patents? Does this collection include the full text for each patent? What time frame is covered by DOepatents? How often is this collection and Web site updated? Does the U.S. Government have exclusive rights to these inventions? What is OSTI? Where can I find information about doing business with DOE? How can I find additional information on the patenting process? Where can I find patents that are not related to DOE?

312

DOE Patents Database - About  

Office of Scientific and Technical Information (OSTI)

About DOepatents About DOepatents DOepatents, developed by the U.S. Department of Energy (DOE) Office of Scientific and Technical Information (OSTI), is a searchable database of patent information resulting from DOE-sponsored research and development (R&D). Included here are patents that DOE sponsored through a variety of funding mechanisms, including grants, contracts, or cooperative agreements. Comprehensive coverage of DOE patent information is one way to demonstrate the Department's contribution to scientific progress in the physical sciences and other disciplines. Publicly available patent information from DOE R&D, historic and current, is presented here, excluding patent applications. DOepatents consists of bibliographic records, with full text where available, either via a PDF file or an HTML link to the record at the

313

Energy Benchmarking Database  

E-Print Network (OSTI)

Building energy benchmarking is a useful starting point for commercial building owners and operators to target energy savings opportunities. There are a number of tools and methods for benchmarking energy use. Benchmarking based on regional data can provides more relevant information for California buildings than national tools such as Energy Star. This paper discusses issues related to benchmarking commercial building energy use and the development of Cal-Arch, a building energy benchmarking database for California. Currently Cal-Arch uses existing survey data from California's Commercial End Use Survey (CEUS), a largely underutilized wealth of information collected by California's major utilities. Doe's Commercial Building Energy Consumption Survey (CBECS) is used by a similar tool, Arch, and by a number of other benchmarking tools. Future versions of Arch/Cal-Arch will utilize additional

Satkartar Kinney; Mary Ann Piette; Satkartar Kinney; Mary Ann Piette; Ernest Orlando Lawrence Berkeley; Satkartar Kinney; Mary Ann Piette

2002-01-01T23:59:59.000Z

314

Genome Properties Database  

DOE Data Explorer (OSTI)

The Genome Properties system consists of a suite of "Properties" which are carefully defined attributes of prokaryotic organisms whose status can be described by numerical values or controlled vocabulary terms for individual completely sequenced genomes. Evaluation of these properties may take place via manual curation or by computer algorithms (numerical calculations or rules-based assignment of controlled vocabulary terms). The Genome Properties system has been designed to capture the widest possible range of attributes and currently encompasses taxonomic terms, genometric calculations, metabolic pathways, systems of interacting macromolecular components and quantitative and descriptive experimental observations (phenotypes) from the literature. Wherever possible, Genome Properties are linked to traceable lines of evidence and links are provided to data for any genes which are part of this evidence. The primary source of evidence linking genes to properties is homology modelling using Hidden Markov Models (HMMs) from the TIGRFAMs and Pfam databases. (Taken from the Genome Properties Home Page)(Specialized Interface)

Haft, Daniel H.; Selengut, Jeremy D.; Brinkac, Lauren M.; Zafar, Nikhat; White, Owen

315

Energy Citations Database (ECD) - Widget  

Office of Scientific and Technical Information (OSTI)

Energy Citations Database Widget Energy Citations Database Widget You can access key features from the Department of Energy's Office of Scientific and Technical Information (DOE/OSTI) by downloading the Energy Citations Database widget. Use the widget to search, receive alerts, and top documents. If you wish you may download and install this widget using its html inclusion code. Get the Energy Citations Database widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info) Search: provides the capability to search the Energy Citations Database collection of science research citations and documents. Alerts: provides the functionally for users with e-mail notification of updates to website content in specific areas of interest. By registering with Energy Citations Database, users can select search queries that are

316

Anual Energy Databases for Download  

NLE Websites -- All DOE Office Websites (Extended Search)

Annual Energy Databases & Modeling Assumptions The following Annual Energy Databases and Documentation can be downloaded from this page: Custom AEP Rating Calculator (Draft November 2001) Original NFRC900 database (542Kb, Excel spreadsheet) developed and approved by NFRC Annual Energy Subcommittee of heating and cooling energies, for 14 typical windows, in 52 North American climates, for typical new houses. Database for Discussion by NFRC Annual Energy Subcommittee: New Homes; 34 RESFEN windows with an infiltration rate of 0.3 cfm/sf; 52 North American climates Database for Discussion by NFRC Annual Energy Subcommittee: Existing Homes; 34 RESFEN windows with an infiltration rate of 0.3 cfm/sf; 52 North American climates RESFEN Modeling Assumptions: Documentation of the modeling assumptions used for all the RESFEN databases

317

Database Manipulation on Quantum Computers  

E-Print Network (OSTI)

Manipulating a database system on a quantum computer is an essential aim to benefit from the promising speed-up of quantum computers over classical computers in areas that take a vast amount of storage and processing time such as in databases. In this paper, the basic operations for manipulating the data in a quantum database will be defined, e.g. INSERT, UPDATE, DELETE, SELECT, backing up and restoring a database file. This gives the ability to perform the data processing that usually takes a long processing time on a classical database system, in a simultaneous way on a quantum computer. Defining a quantum version of more advanced concepts used in database systems, e.g. the referential integrity and the relational algebra, is a normal extension to this work

Ahmed Younes

2007-05-29T23:59:59.000Z

318

Biological & Environmental Research Abstracts Database  

Office of Scientific and Technical Information (OSTI)

and Environmental Research Abstracts Database. Please logon. Logon Name: Password: Logon CommentsEmail Us * SecurityDisclaimer Notices * BER Abstracts Last Updated: September 27...

319

Biological & Environmental Research Abstracts Database  

Office of Scientific and Technical Information (OSTI)

Welcome to the Biological and Environmental Research Abstracts Database The U.S. Department of Energy's Office of Biological and Environmental Research (BER) conducts research in...

320

DOE Corporate Lessons Learned Database  

NLE Websites -- All DOE Office Websites (Extended Search)

Lessons Learned Database Home About This Site Contact Us Related Links Defense Nuclear Security Lessons Learned Center (DNS-LLC) Corporate Operating Experience Review Program...

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

OpenEI - Technical Database  

Open Energy Info (EERE)

http:en.openei.orgdatasetstaxonomyterm8720 en Technical Reference and Technical Database for Hydrogen Compatibility of Materials http:en.openei.orgdatasetsnode927...

322

Download Data | Transparent Cost Database  

Open Energy Info (EERE)

in the database does not represent approval of the estimates by DOE or NREL. Levelized cost calculations DO NOT represent real world market conditions. The calculation uses a...

323

NIST Standard Reference Database 84  

Science Conference Proceedings (OSTI)

... containing more than 120,000 entries and covering the literature from 1913 to the present. The database has a Windows-based graphical user ...

2013-04-23T23:59:59.000Z

324

WEB RESOURCE: Nuclear Materials Database  

Science Conference Proceedings (OSTI)

Feb 12, 2007 ... Mechanical properties data for stainless steels and superalloys; mechanical properties data for nuclear materials as a database for research ...

325

Search Our Online Image Database  

NLE Websites -- All DOE Office Websites (Extended Search)

Accelerator and Components Detectors and Computing People and Events Environment Graphics and Illustrations The images included in this database are the property of the U.S....

326

Corrosion Databases and Data Compilations  

Science Conference Proceedings (OSTI)

Table 4   Selected corrosion databases and data compilations...U.S. Bureau of Labor Statistics Consumer price indexes for the United States

327

SHSD Manager Safety Engineering Group Manager  

E-Print Network (OSTI)

Safety, Excavation Safety, Scaffold Safety D. Cubillo: Division Database Programmer J. Durnan: Design. Horn (0.5) ORPS Categorizer S. Moss (Emeritus) S. Kane, Group Manager 9/7/10 Environment, Safety

328

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP-UX Directory Server Discloses Passwords to Remote 6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May 29, 2013 - 12:32am Addthis PROBLEM: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users PLATFORM: Directory Server B.08.10.04 ABSTRACT: Two vulnerabilities were reported in HP-UX Directory Server. REFERENCE LINKS: HP Document ID: c03772083 SecurityTracker Alert ID: 1028593 CVE-2012-2678 CVE-2012-2746 IMPACT ASSESSMENT: High DISCUSSION: A local user can access the plaintext password in certain cases [CVE-2012-2678]. A remote authenticated user can can view the password for a target LDAP user when audit logging is enabled by reading the audit log [CVE-2012-2678].

329

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

330

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

331

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

332

V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: MediaWiki CentralAuth Extension Authentication Bypass 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for MediaWik REFERENCE LINKS: Secunia Advisory SA54723 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauth_User" cookie. IMPACT:

333

Provably-Secure two-round password-authenticated group key exchange in the standard model  

Science Conference Proceedings (OSTI)

Password-authenticated group key exchange (PAGKE) allows group users to share a session key using a human-memorable password only. The fundamental security goal of PAGKE is security against dictionary attacks. Several solutions have been proposed ...

Jeong Ok Kwon; Ik Rae Jeong; Dong Hoon Lee

2006-10-01T23:59:59.000Z

334

Olive Oil: Chemistry and Technology, 2nd EditionChapter 7 Analysis and Authentication  

Science Conference Proceedings (OSTI)

Olive Oil: Chemistry and Technology, 2nd Edition Chapter 7 Analysis and Authentication Food Science Health Nutrition Biochemistry Processing eChapters Food Science & Technology Health - Nutrition - Biochemistry Processing Press

335

The Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA  

E-Print Network (OSTI)

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). This memo describes the use of the Timed Efficient Stream Losstolerant Authentication (RFC 4082) transform within the Secure Realtime Transport Protocol (SRTP), to provide data origin authentication

M. Baugher; E. Carrara

2006-01-01T23:59:59.000Z

336

Management  

E-Print Network (OSTI)

Research has indicated that, depending upon driver and passenger characteristics, passengers can have either a positive or negative influence upon driver behaviour. In conclusion to a recent study investigating the roles that passengers can play to influence, positively and negatively, driver behaviour, Regan and Mitsopoulos (2001) recommended, among other things, that the principles of Crew Resource Management (CRM) training may increase passengers ’ ability to positively influence driver behaviour and also drivers ’ ability to accept constructive feedback. The present study investigated the potential application of CRM training within young driver training in the Australian Capital Territory (ACT). This involved a literature review, an analysis of the differences between the driving and aviation domains, an analysis of the team-based activities and the knowledge, skills and attitudes required during driving to perform those activities, consultation with CRM experts from the aviation and medicine domains and the conduct of six focus groups involving young learner drivers, provisional licence drivers and course teachers. The findings indicate that CRM training as part of young driver training in the ACT is a viable concept to pursue. The application of CRM training within young driver training has potential to significantly enhance the positive and reduce the negative effects of passengers on young driver behaviour, and thus the safety of young drivers and passengers alike. The outcomes of this study formed the basis for a set of recommendations for the development of a young driver CRM training program in the ACT.

Young Drivers; Eve Mitsopoulos; Michael Regan; Janet Anderson; Paul Salmon; Jessica Edquist; Ii Report Documentation Page

2005-01-01T23:59:59.000Z

337

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker Alert ID:1025190 Secunia Advisory:SA43331 OpenLDAP Issue OpenLDAP Download CVE-2011-1025 IMPACT ASSESSMENT: Medium Discussion: A remote user with knowledge of the target distinguished name can provide an arbitrary password to successfully authenticate on systems using the NDB back-end. Impact: Some vulnerabilities have been reported in OpenLDAP, which can be exploited

338

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: eXtplorer "ext_find_user()" Authentication Bypass 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug. IMPACT: An error within the "ext_find_user()" function in users.php can be

339

AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES  

SciTech Connect

This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

Poland, R.; Drayer, R.; Wilson, J.

2013-08-12T23:59:59.000Z

340

(BARS) -- Bibliographic Retrieval System Sandia shock compression (SSC) database shock physics index (SPHINX) database. Volume 3, UNIX version Systems Guide  

SciTech Connect

The Bibliographic Retrieval System (BARS) is a database management system specially designed to store and retrieve bibliographic references and track documents. The system uses INGRES to manage this database and user interface. It uses forms for journal articles, books, conference proceedings, theses, technical reports, letters, memos, visual aids, as well as a miscellaneous form which can be used for data sets or any other material which can be assigned an access or file number. Sorted output resulting from flexible BOOLEAN searches can be printed or saved in files which can be inserted in reference lists for use with word processors.

von Laven, G.M. [Advanced Software Engineering, Madison, AL (United States); Herrmann, W. [Sandia National Labs., Albuquerque, NM (United States)

1993-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Wind turbine reliability database update.  

SciTech Connect

This report documents the status of the Sandia National Laboratories' Wind Plant Reliability Database. Included in this report are updates on the form and contents of the Database, which stems from a fivestep process of data partnerships, data definition and transfer, data formatting and normalization, analysis, and reporting. Selected observations are also reported.

Peters, Valerie A.; Hill, Roger Ray; Stinebaugh, Jennifer A.; Veers, Paul S.

2009-03-01T23:59:59.000Z

342

Chesapeake Bay Program Water Quality Database | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Chesapeake Bay Program Water Quality Database Chesapeake Bay Program Water Quality Database Ocean Data Tools Technical Guide Map Gallery Regional Planning Feedback Ocean You are here Data.gov » Communities » Ocean » Data Chesapeake Bay Program Water Quality Database Dataset Summary Description The Chesapeake Information Management System (CIMS), designed in 1996, is an integrated, accessible information management system for the Chesapeake Bay Region. CIMS is an organized, distributed library of information and software tools designed to increase basin-wide public access to Chesapeake Bay information. The information delivered by CIMS includes technical and public information, educational material, environmental indicators, policy documents, and scientific data. Through the use of relational databases, web-based programming, and web-based GIS a large number of Internet resources have been established. These resources include multiple distributed on-line databases, on-demand graphing and mapping of environmental data, and geographic searching tools for environmental information. Baseline monitoring data, summarized data and environmental indicators that document ecosystem status and trends, confirm linkages between water quality, habitat quality and abundance, and the distribution and integrity of biological populations are also available. One of the major features of the CIMS network is the Chesapeake Bay Program's Data Hub, providing users access to a suite of long- term water quality and living resources databases. Chesapeake Bay mainstem and tidal tributary water quality, benthic macroinvertebrates, toxics, plankton, and fluorescence data can be obtained for a network of over 800 monitoring stations.

343

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

344

Environmental GIS database for the White Sea  

E-Print Network (OSTI)

Introduction The European Commission INCO Copernicus project was promoted in autumn 2000 as "Sustainable management of the marine ecosystem and living resources of the White Sea". One of the scientific and technical objectives is t o create dedicated environmental, ecological and socio-economic databases integrated in a Geographical Information System (GIS) for the White Sea region. To ensure the access to the database development also in the future, the open source gis approach as GRASS5.0 was chosen [1]. Into the White Sea GRASS-GIS database the bathymetry data with resolution 1 by 0.5 minutes was used to model the bottom surface of the White Sea. Russian coordinate system of Pulkova 42 was used. DCW vector data were used for the shoreline and the White Sea was divided to 7 traditional geographic areas. Raster layer of the bathymetry was divided with vector polygons to appropriate geographic areas and the area and volume were calculated. The hydrological and chemical parameters as

Seppo Kaitala; Anatoly Shavykin; Vladimir A. Volkov

2002-01-01T23:59:59.000Z

345

T-703: Cisco Unified Communications Manager Open Query Interface...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets...

346

Energy Citations Database (ECD) - About  

Office of Scientific and Technical Information (OSTI)

About ECD About ECD The Energy Citations Database (1943 - Present) was developed by the U.S. Department of Energy (DOE) Office of Scientific and Technical Information (OSTI) to improve access to Departmental and predecessor agency scientific and technical information (STI). The Energy Citations Database (ECD) contains bibliographic citations for energy and energy related STI from the Department of Energy (DOE) and its predecessor agencies, the Energy Research & Development Administration (ERDA) and the Atomic Energy Commission (AEC). The Database provides access to electronic documents, primarily from 1943 forward, with continued growth through regular updates. Features of ECD include: bibliographic citations for scientific and technical information dating from 1943 to the present;

347

The Automatic Library Tracking Database  

SciTech Connect

A library tracking database has been developed and put into production at the National Institute for Computational Sciences and the Oak Ridge Leadership Computing Facility (both located at Oak Ridge National Laboratory.) The purpose of the library tracking database is to track which libraries are used at link time on Cray XT5 Supercomputers. The database stores the libraries used at link time and also records the executables run in a batch job. With this data, many operationally important questions can be answered such as which libraries are most frequently used and which users are using deprecated libraries or applications. The infrastructure design and reporting mechanisms are presented along with collected production data.

Fahey, Mark R [ORNL; Jones, Nicholas A [ORNL; Hadri, Bilel [ORNL

2010-01-01T23:59:59.000Z

348

Industry-Wide Substation Equipment Performance and Failure Database  

Science Conference Proceedings (OSTI)

The Electric Power Research Institutes (EPRIs) Transformer Industrywide Database (IDB) is a collaborative effort to pool appropriate transformer operating and failure data in order to assemble a statistically valid population of many types of power transformers. Analysis of these data will provide information about transformer historical performance and models for projecting future performance useful for aiding both asset management and maintenance managers. This report presents the current status of the...

2010-12-23T23:59:59.000Z

349

A Survey on Database Performance in Virtualized Cloud Environments  

Science Conference Proceedings (OSTI)

Cloud Computing emerged as a major paradigm over the years. Major challenges it poses to computer science are related to latency, scale, and reliability issues. It leverages strong economical aspects and provides sound answers to questions like energy ... Keywords: Cloud Computing, Database Management Systems DBMS, Online Transaction Processing OLTP, Performance, Virtualization

Alejandro Buchmann; Todor Ivanov; Ilia Petrov

2012-07-01T23:59:59.000Z

350

ISSUES MANAGEMENT PROGRAM MANUAL  

E-Print Network (OSTI)

ISSUES MANAGEMENT PROGRAM MANUAL LBNL/PUB-5519 (1), Rev. 0and Analysis Program Manual. LBNL/PUB-5519 (1), Rev. 0the Regulations and Procedures Manual (RPM): CATS database o

Gravois, Melanie

2007-01-01T23:59:59.000Z

351

"Magic mirror on the wall, who's the fastest Database of them all?" A Survey of Database Benchmarks  

E-Print Network (OSTI)

Benchmarks are important tools for measuring the performance of database management systems (DBMS) and for understanding vendor claims of performance. This paper defines DBMS benchmarks, explores the role of the Transaction Processing Performance Council as the only benchmark standards organization, and surveys eight existing DBMS benchmarks for on-line transaction processing, relational, and object-oriented databases. 1 Introduction When examining the performance of a commercial database management system (DBMS),one is bombarded with vendor performance claims. Each vendor will shower you with claims of "tpsA-Local" ratings, or top performance on the "TPC-C" benchmark. If you are looking at a commercial object-oriented DBMS, vendors will tell you they have the best performance on the "Cattell" (or OO1 or "Sun") benchmark. The use of benchmark performance measurements by commercial DBMS vendors seems a bit like the Queen in Snow White asking the magic mirror who is the fairest. If the ...

Usaf Maj; Timothy J. Halloran; Timothy J. Halloran; Mark A. Roth; Mark A. Roth

1993-01-01T23:59:59.000Z

352

Database | OpenEI Community  

Open Energy Info (EERE)

Database Database Home Kyoung's picture Submitted by Kyoung(155) Contributor 14 October, 2013 - 20:19 Geothermal NEPA Workshop at GRC Categorical Exclusions CX Database EA EIS FONSI GEA GRC GRR NEPA On Tuesday, October 2, the Geothermal Technology Office and the National Renewable Energy Laboratory held a 1/2-day NEPA workshop. The workshop was held at the MGM Grand in Las Vegas, in conjunction with the GEA/GRC Tradeshow and Conference. Three presentations were given, describing the NEPA database and associated analysis that had been conducted in 2013. Files: application/vnd.openxmlformats-officedocument.presentationml.presentation icon 2. NEPA History - Presentation application/vnd.openxmlformats-officedocument.presentationml.presentation icon 3. Categorical Exclusions - Presentation

353

ORISE: Human Subjects Research Database  

NLE Websites -- All DOE Office Websites (Extended Search)

Human Subjects Research Database Section 10, Part 745 of the Code of Federal Regulations and U.S. Department of Energy (DOE) Orders 443.1 and 481.1 require the maintenance of...

354

Spatial network modeling for databases  

Science Conference Proceedings (OSTI)

Spatial networks like transportation, power, and pipeline networks are a ubiquitous spatial concept in everyday life and play an important role for navigational and routing purposes. Database support for large spatial networks in order to represent, ...

Virupaksha Kanjilal; Markus Schneider

2011-03-01T23:59:59.000Z

355

Energy Citations Database (ECD) - Comments  

Office of Scientific and Technical Information (OSTI)

Contact Us If you have a question about Energy Citations Database, we recommend you check frequently asked questions. If your question still has not been answered or if you wish to...

356

The Nuclear Science References Database  

E-Print Network (OSTI)

The Nuclear Science References (NSR) database together with its associated Web interface, is the world's only comprehensive source of easily accessible low- and intermediate-energy nuclear physics bibliographic information for more than 210,000 articles since the beginning of nuclear science. The weekly-updated NSR database provides essential support for nuclear data evaluation, compilation and research activities. The principles of the database and Web application development and maintenance are described. Examples of nuclear structure, reaction and decay applications are specifically included. The complete NSR database is freely available at the websites of the National Nuclear Data Center http://www.nndc.bnl.gov/nsr and the International Atomic Energy Agency http://www-nds.iaea.org/nsr.

Pritychenko, B; Singh, B; Totans, J

2013-01-01T23:59:59.000Z

357

NIST Atomic Spectra Database Introduction  

Science Conference Proceedings (OSTI)

... plus up to the first five spectra of the lanthanide rare earths (Z=57-71 ... Each page of the ASD database (except the ASD home page) includes a menu ...

2010-10-05T23:59:59.000Z

358

Analytical Chemistry Databases and Links  

Science Conference Proceedings (OSTI)

Analytical chemistry websites, humor, Material Safety Data Sheets,Patent Information, and references. Analytical Chemistry Databases and Links Analytical Chemistry acid analysis Analytical Chemistry aocs applicants april articles atomic)FluorometryDiffer

359

Hydrogen Storage Materials Database Demonstration  

NLE Websites -- All DOE Office Websites (Extended Search)

| Fuel Cell Technologies Program Source: US DOE 4/25/2011 eere.energy.gov | Fuel Cell Technologies Program Source: US DOE 4/25/2011 eere.energy.gov Hydrogen Storage Materials Database Demonstration FUEL CELL TECHNOLOGIES PROGRAM Ned Stetson Storage Tech Team Lead Fuel Cell Technologies Program U.S. Department of Energy 12/13/2011 Hydrogen Storage Materials Database Marni Lenahan December 13, 2011 Database Background * The Hydrogen Storage Materials Database was built to retain information from DOE Hydrogen Storage funded research and make these data more accessible. * Data includes properties of hydrogen storage materials investigated such as synthesis conditions, sorption and release conditions, capacities, thermodynamics, etc. http://hydrogenmaterialssearch.govtools.us Current Status * Data continues to be collected from DOE funded research.

360

World electric power plants database  

SciTech Connect

This global database provides records for 104,000 generating units in over 220 countries. These units include installed and projected facilities, central stations and distributed plants operated by utilities, independent power companies and commercial and self-generators. Each record includes information on: geographic location and operating company; technology, fuel and boiler; generator manufacturers; steam conditions; unit capacity and age; turbine/engine; architect/engineer and constructor; and pollution control equipment. The database is issued quarterly.

NONE

2006-06-15T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Creating a Physical Standby Database........................................ 13 Creating a Logical Standby Database.......................................... 13  

E-Print Network (OSTI)

Failing Over to a Local Standby Database................................... 14 Switching Over to a Local Standby Database.............................. 15 Upgrading Oracle Database with a Logical Standby Database.... 16 Upgrading Oracle Database with a Transient Logical Standby.... 17 Testing with a Physical Standby Database...................................... 19

Oracle Data Guard; Operational Procedures; Peoplesoft Multi-pillar Environments

2010-01-01T23:59:59.000Z

362

Rice Glycosyltransferase (GT) Phylogenomic Database  

DOE Data Explorer (OSTI)

The Ronald Laboratory staff at the University of California-Davis has a primary research focus on the genes of the rice plant. They study the role that genetics plays in the way rice plants respond to their environment. They created the Rice GT Database in order to integrate functional genomic information for putative rice Glycosyltransferases (GTs). This database contains information on nearly 800 putative rice GTs (gene models) identified by sequence similarity searches based on the Carbohydrate Active enZymes (CAZy) database. The Rice GT Database provides a platform to display user-selected functional genomic data on a phylogenetic tree. This includes sequence information, mutant line information, expression data, etc. An interactive chromosomal map shows the position of all rice GTs, and links to rice annotation databases are included. The format is intended to "facilitate the comparison of closely related GTs within different families, as well as perform global comparisons between sets of related families." [From http://ricephylogenomics.ucdavis.edu/cellwalls/gt/genInfo.shtml] See also the primary paper discussing this work: Peijian Cao, Laura E. Bartley, Ki-Hong Jung and Pamela C. Ronalda. Construction of a Rice Glycosyltransferase Phylogenomic Database and Identification of Rice-Diverged Glycosyltransferases. Molecular Plant, 2008, 1(5): 858-877.

Ronald, Pamela

363

REDD Country Activity Database | Open Energy Information  

Open Energy Info (EERE)

REDD Country Activity Database REDD Country Activity Database Jump to: navigation, search Tool Summary Name: REDD Country Activity Database Agency/Company /Organization: Global Canopy Programme, Forum on Readiness for REDD Sector: Land Focus Area: Forestry Topics: Background analysis Resource Type: Dataset, Case studies/examples User Interface: Website Website: www.theredddesk.org/countries Country: Brazil, Cameroon, Vietnam, Guyana, Tanzania, Indonesia Cost: Free UN Region: Southern Africa, South America, South-Eastern Asia REDD Country Activity Database Screenshot References: REDD Country Activity Database[1] Logo: REDD Country Activity Database The REDD Countries Database is a centralised and collaborative database of the diverse and rapidly evolving range of ongoing REDD activities in

364

Database Design Using Entity-Relationship Diagrams  

Science Conference Proceedings (OSTI)

With this comprehensive guide, database designers and developers can quickly learn all the ins and outs of E-R diagramming to become expert database designers.

Sikha Bagui; Richard Earp

2003-06-01T23:59:59.000Z

365

Clean Cities: Clean Cities Annual Reporting Database  

NLE Websites -- All DOE Office Websites (Extended Search)

Annual Reporting Database to someone by E-mail Share Clean Cities: Clean Cities Annual Reporting Database on Facebook Tweet about Clean Cities: Clean Cities Annual Reporting...

366

Building Technologies Office: Life Cycle Inventory Database  

NLE Websites -- All DOE Office Websites (Extended Search)

Life Cycle Inventory Database to someone by E-mail Share Building Technologies Office: Life Cycle Inventory Database on Facebook Tweet about Building Technologies Office: Life...

367

A database-centric approach to system managemant in the blue gene/L supercomputer  

Science Conference Proceedings (OSTI)

In designing the management system for Blue Gene/L, we adopted a database-centric approach, All configuration and operational data for a particular Blue Gene/L system are stored in a relational database that is kept in the system's service node. The ...

Ralf Bellofatto; Paul G. Crumley; David Darrington; Brant knudson; Mark Megerian; José E. Moreira; Alda S. Ohmacht; John Orbeck; Don Reed; Greg Stewart

2006-04-01T23:59:59.000Z

368

Database Architecture for a Computer Network  

E-Print Network (OSTI)

Performance of various components of telecommunication systems and data networks need to be monitored continuously. Monitored information is presented to system operators and managers to assist them in the efficient operation and effective management of the system. Analysis of performance information can also reveal existing shortcomings and impending failures in the monitored network. The level of detail of the information presented to each group of individuals is also different. System operators are generally interested in fine grained real-time information that warns them of impending failure conditions. Alternatively, senior level managers need to view the performance information collected and summarised over several weeks depicting trends in the utilisation of the network. For an accurate historical analysis of a network's performance, performance data needs to be maintained for significantly long periods of time. User queries to the performance database may result in the retrieval and processing of large volumes of data. Furthermore, users may generate several different queries on the same dataset during the analysis process. Effective management of monitored performance data and derived information is, therefore, required to guarantee efficient and accurate analysis.

Performance Monitoring System; Omar Bashir; David Parish; Iain Phillips

2001-01-01T23:59:59.000Z

369

An Evaluation of Database Solutions to Spatial Object Association  

Science Conference Proceedings (OSTI)

Object association is a common problem encountered in many applications. Spatial object association, also referred to as crossmatch of spatial datasets, is the problem of identifying and comparing objects in two datasets based on their positions in a common spatial coordinate system--one of the datasets may correspond to a catalog of objects observed over time in a multi-dimensional domain; the other dataset may consist of objects observed in a snapshot of the domain at a time point. The use of database management systems to the solve the object association problem provides portability across different platforms and also greater flexibility. Increasing dataset sizes in today's applications, however, have made object association a data/compute-intensive problem that requires targeted optimizations for efficient execution. In this work, we investigate how database-based crossmatch algorithms can be deployed on different database system architectures and evaluate the deployments to understand the impact of architectural choices on crossmatch performance and associated trade-offs. We investigate the execution of two crossmatch algorithms on (1) a parallel database system with active disk style processing capabilities, (2) a high-throughput network database (MySQL Cluster), and (3) shared-nothing databases with replication. We have conducted our study in the context of a large-scale astronomy application with real use-case scenarios.

Kumar, V S; Kurc, T; Saltz, J; Abdulla, G M; Kohn, S; Matarazzo, C

2008-06-24T23:59:59.000Z

370

Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population  

E-Print Network (OSTI)

In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlying computations in HB protocols are very efficient, our protocol also reduces reader load compared to PRF-based protocols. We suggest a tree-based approach that replaces the PRF-based authentication from prior work with a procedure such as HB+ or HB#. We optimize the tree- traversal stage through usage of a "light version" of the underlying protocol and shared random challenges across all levels of the tree. This provides significant reduction of the communication resources, resulting in a privacy-preserving protocol almost as efficient as the underlying HB+ or HB#

Halevi, Tzipora; Halevi, Shai

2009-01-01T23:59:59.000Z

371

Synchronization and recovery in an embedded database system for read-only transactions  

Science Conference Proceedings (OSTI)

Transactions within an embedded database management system face many restrictions. These can not afford unlimited delays or participate in multiple retry attempts for execution. The proposed embedded concurrency control (ECC) techniques provide support ...

Subhash Bhalla; Masaki Hasegawa

2005-12-01T23:59:59.000Z

372

Home Heating Systems Design using PHP and MySQL Databases  

E-Print Network (OSTI)

This paper presents the use of a computer application based on a MySQL database, managed by PHP programs, allowing the selection of a heating device using coefficient-based calculus.

Karnyanszky, Tiberiu Marius

2009-01-01T23:59:59.000Z

373

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and  

E-Print Network (OSTI)

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

Baras, John S.

374

A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia  

E-Print Network (OSTI)

A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

Zhu, Sencun

375

An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings  

Science Conference Proceedings (OSTI)

With the continue evaluation of mobile devices in terms of the capabilities and services, security concerns increase dramatically. To provide secured communication in mobile client-server environment, many user authentication protocols from pairings ... Keywords: Bilinear pairing, ID-based, Key agreement, Mobile device, Mutual authentication, Provable security

Debiao He

2012-08-01T23:59:59.000Z

376

Design and development of a mobile EPC-RFID-based self-validation system (MESS) for product authentication  

Science Conference Proceedings (OSTI)

The increase in the number of counterfeits penetrating into the open market has created the need for a product authentication approach in tracing and tracking the product anytime, anywhere. Owing to the vague concepts frequently represented in flow of ... Keywords: Anti-counterfeit system, Counterfeiting, Electronic product code (EPC), Product authentication, Radio frequency identification (RFID)

S. K. Kwok; Jacky S. L. Ting; Albert H. C. Tsang; W. B. Lee; Benny C. F. Cheung

2010-09-01T23:59:59.000Z

377

Office of Information Management - Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

security of HSS Department-wide databases and systems in support of the HSS missions in health, safety, and security. Manages technology-related organizational change and advises...

378

Federal Energy Management Program: Information Resources  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

associated with energy management in the Federal sector. Frequently Asked Questions: Database of frequently asked questions (FAQs) across FEMP programs. News FEMP Launches New...

379

Solid Waste Projection Model: Database (Version 1.3). Technical reference manual  

SciTech Connect

The Solid Waste Projection Model (SWPM) system is an analytical tool developed by Pacific Northwest Laboratory (PNL) for Westinghouse Hanford Company (WHC). The SWPM system provides a modeling and analysis environment that supports decisions in the process of evaluating various solid waste management alternatives. This document, one of a series describing the SWPM system, contains detailed information regarding the software and data structures utilized in developing the SWPM Version 1.3 Database. This document is intended for use by experienced database specialists and supports database maintenance, utility development, and database enhancement.

Blackburn, C.L.

1991-11-01T23:59:59.000Z

380

Disclaimer concerning the fundamental constants database  

Science Conference Proceedings (OSTI)

... Uncertainty Constants, Units & Uncertainty home page. Disclaimer concerning the fundamental constants database The ...

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Energy Citations Database (ECD) - FAQ  

Office of Scientific and Technical Information (OSTI)

ECD Frequently Asked Questions (FAQs) What does the Energy Citations Database (ECD) contain? and what is the date range of the content? When was ECD created and why? What are the topics in ECD? Search Architecture - What Is under the hood? How often are documents added to the database? Is Energy Citations Database (ECD) the electronic equivalent of Energy Research Abstracts (ERA)? How do I find a document in ECD? How do I know if a document is available electronically? Of what value is a citation without an electronic document? How do I download a document? how long will it take? and how much will it cost? If I am interested in just a few pages, can I download only those pages of interest? Can I capture citations using Zotero? How do I get a copy of a journal article?

382

Exporter Database | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Exporter Database Exporter Database Manufacturing Data/Tools Research/Tech Services Apps Challenges Blogs Let's Talk Manufacturing You are here Data.gov » Communities » Manufacturing » Data Exporter Database Dataset Summary Description This tool provides a statistical overview and tables outlining the export activities of U.S. small and medium-sized enterprises (SMEs), which are defined as firms that have fewer than 500 employees. All figures in this overview and tables include only identifiable or "known" exports, i.e., exports that can be linked to individual companies using information on U.S. export declarations. Tags {exporter,"small and medium businesses",SME} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access

383

Access to DOE Database of Oil and Natural Gas Research Results Expanded |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access to DOE Database of Oil and Natural Gas Research Results Access to DOE Database of Oil and Natural Gas Research Results Expanded Access to DOE Database of Oil and Natural Gas Research Results Expanded January 12, 2011 - 12:00pm Addthis Washington, DC - The results of nearly four decades of research supported by the U.S. Department of Energy (DOE) are now available through the OnePetro online document repository. TheOnePetro website now contains NETL's Oil & Gas Knowledge Management Database. DOE's Knowledge Management Database (KMD) provides access to content from dozens of CDs and DVDs related to oil and natural gas research that the Office of Fossil Energy's (FE) National Energy Technology Laboratory (NETL) has published over the years. It also provides links to reports, data sets, and project summaries from ongoing research supported

384

X/motif based relational database in digital simulators application for protective relay testing  

E-Print Network (OSTI)

With the increase in complexity of digital simulator use for protective relay testing, the large volume of data during simulation and relay testing is generated. The management of these data is a challenging problem. This thesis describes a relational database to be used as a central repository for data in digital simulator for protective relay testing. The requirement analysis for data management in digital simulation for protective relay testing, the design of the database, and the design of application programs using RIM relational database system are presented. The design of the user interface for database application, which is implemented using X/Motif and C, to facilitate the access to the database is also discussed.

Qi, Xiaoxia

1995-01-01T23:59:59.000Z

385

REACLIB Database from the Joint Institute for Nuclear Astrophysics (JINA)  

DOE Data Explorer (OSTI)

The Joint Institute for Nuclear Astrophysics is NSF-funded, but four of DOE's National Laboratories are involved in the REACLIB database. The database is a large and important resource for nuclear reaction rates used in astrophysical model calculations. It contains multiple versions of each rate with one recommended rate and is continuously updated. Public REACLIB releases are available as libraries and represent snapshots of the database on a particular date. Users can also define their own libraries and make them public to document the rates they used. Users are not required to have an account to browse and download data. You will need an account only if you wish to create and manage your own libraries.

386

Characterization analysis database system (CADS): A system overview  

SciTech Connect

The CADS database is a standardized, quality-assured, and configuration-controlled data management system developed to assist in the task of characterizing the DOE surplus HEU material. Characterization of the surplus HEU inventory includes identifying the specific material; gathering existing data about the inventory; defining the processing steps that may be necessary to prepare the material for transfer to a blending site; and, ultimately, developing a range of the preliminary cost estimates for those processing steps. Characterization focuses on producing commercial reactor fuel as the final step in material disposition. Based on the project analysis results, the final determination will be made as to the viability of the disposition path for each particular item of HEU. The purpose of this document is to provide an informational overview of the CADS database, its evolution, and its current capabilities. This document describes the purpose of CADS, the system requirements it fulfills, the database structure, and the operational guidelines of the system.

1997-12-01T23:59:59.000Z

387

Study of location management for next generation personal communication networks  

Science Conference Proceedings (OSTI)

The main target of location management is to maintain location of users while minimizing the system operation. The process consists of location update, paging, and database consideration. The location update and paging manages the user-network interaction ... Keywords: centralized database (CDB), distributed database (DDB), location area scheme, location update, timer-based update strategy, velocity paging (VP)

Teerapat Sanguankotchakorn; Panuvit Wibullanon

2005-03-01T23:59:59.000Z

388

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44: McAfee Email Gateway Lets Remote Users Bypass Authentication 44: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

389

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: McAfee Email Gateway Lets Remote Users Bypass Authentication 4: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

390

Authentication of images for 3D cameras: Reversibly embedding information using intelligent approaches  

Science Conference Proceedings (OSTI)

In this work, a reversible watermarking approach for authentication of 3D cameras based on computational intelligence is presented. Two intelligent techniques based on differential evolution (DE) and hybrid DE are employed to optimize the tradeoff between ... Keywords: 3D camera, Depth maps, Differential evolution algorithm, Integer wavelet transform, Particle swarm optimization, Reversible watermarking

Sana Ambreen Malik; Asifullah Khan; Mutawarra Hussain; Khurram Jawad; Rafiullah Chamlawi; Abdul Jalil

2012-11-01T23:59:59.000Z

391

Can we fix the security economics of federated authentication? (transcript of discussion)  

Science Conference Proceedings (OSTI)

OK, so the talk that I've got today is entitled "Can We Fix the Security Economics of Federated Authentication?" and some of this is stuff that I did while I was at Google in January and February. I'm on sabbatical this year and so I'm visiting various ...

Ross Anderson

2011-03-01T23:59:59.000Z

392

Security Analysis and Implementation of JUIT—Image Based Authentication System Using Kerberos Protocol  

Science Conference Proceedings (OSTI)

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along ... Keywords: Image Based Authentication System, AJAX, MySQL, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack

Nitin; Durg Singh Chauhan; Vivek Kumar Sehgal; Ankit Mahanot; Pallavi Singh; Sohit Ahuja; Utkarsh Shrivastava; Manisha Rana; Vineet Punjabi; Shivam Vinay; Nakul Sharma

2008-05-01T23:59:59.000Z

393

Strong password-based authentication in TLS using the three-party group Diffie Hellman protocol  

Science Conference Proceedings (OSTI)

The internet has evolved into a very hostile ecosystem where 'phishing' attacks are common practice. This paper shows that the three-party group Diffie-Hellman key exchange can help protect against these attacks. We have developed password-based ... Keywords: TLS, cryptography, group Diffie Hellman key exchange, networks, password authentication, phishing attacks, transport layer security

Michel Abdalla; Emmanuel Bresson; Olivier Chevassut; Bodo Moller; David Pointcheval

2007-04-01T23:59:59.000Z

394

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

395

Dual lookups in pattern databases  

Science Conference Proceedings (OSTI)

A pattern database (PDB) is a heuristic function stored as a lookup table. Symmetries of a state space are often used to enable multiple values to be looked up in a PDB for a given state. This paper introduces an additional PDB lookup, called the dual ...

Ariel Felner; Uzi Zahavi; Jonathan Schaeffer; Robert C. Holte

2005-07-01T23:59:59.000Z

396

Marine and Hydrokinetic Technology Database  

DOE Data Explorer (OSTI)

Results are displayed as a list of technologies, companies, or projects. Data can be filtered by a number of criteria, including country/region, technology type, generation capacity, and technology or project stage. The database is currently (2009) being updated to include ocean thermal energy technologies, companies, and projects.[Taken from http://www2.eere.energy.gov/windandhydro/hydrokinetic/

397

Midcontinent Interactive Digital Carbon Atlas and Relational Database (MIDCARB)  

Science Conference Proceedings (OSTI)

This annual report describes progress of the project entitled ''Midcontinent Interactive Digital Carbon Atlas and Relational Database (MIDCARB)''. This project, funded by the Department of Energy, is a cooperative project that assembles a consortium of five states (Indiana, Illinois, Kansas, Kentucky and Ohio) to construct an online distributed Relational Database Management System (RDBMS) and Geographic Information System (GIS) covering aspects of carbon dioxide geologic sequestration (http://www.midcarb.org). The system links the five states in the consortium into a coordinated regional database system consisting of datasets useful to industry, regulators and the public. The project is working to provide advanced distributed computing solutions to link database servers across the five states into a single system where data is maintained at the local level but is accessed through a single Web portal and can be queried, assembled, analyzed and displayed. Each individual state has strengths in data gathering, data manipulation and data display, including GIS mapping, custom application development, web development, and database design. Sharing of expertise provides the critical mass of technical expertise to improve CO{sub 2} databases and data access in all states. This project improves the flow of data across servers in the five states and increases the amount and quality of available digital data. The MIDCARB project is developing improved online tools to provide real-time display and analyze CO{sub 2} sequestration data. The system links together data from sources, sinks and transportation within a spatial database that can be queried online. Visualization of high quality and current data can assist decision makers by providing access to common sets of high quality data in a consistent manner.

Timothy R. Carr; Scott W. White

2002-06-01T23:59:59.000Z

398

Risk Management Tool Attributes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- Tools & SMEs - Tools & SMEs Outline for Breakout Session TOOLS 1. Types of Tools a. Risk Management - Database & Reports, risk register, risk forms, risk tracking & monitoring, basis of estimate, action item tracking, historical record of risks & changes, configuration control, enterprise-wide, metrics, risk performance index, risk checklist, graphical display, management reporting (various levels), risk communications b. Risk Analysis i. Cost, ii. budgets, funding, cash-flow analysis, iii. Schedule iv. tailoring categories v. Integrated Cost & Schedule vi. Project phase analysis; organization ownership & joint planning c. Risk Knowledge and Lessons Learned Database i. Enterprise-wide ii. Job/owner-specific iii. Workshops - project specific, risk management,

399

WTO Subsidy Notifications Database | Open Energy Information  

Open Energy Info (EERE)

WTO Subsidy Notifications Database WTO Subsidy Notifications Database Jump to: navigation, search Tool Summary LAUNCH TOOL Name: WTO Subsidy Notifications Database Agency/Company /Organization: World Trade Organization Topics: Finance, Market analysis, Policies/deployment programs Resource Type: Dataset Website: www.globalsubsidies.org/private/modules/knowledgebox/external/index.ph WTO Subsidy Notifications Database Screenshot References: WTO Subsidy Database[1] Overview "This searchable database provides links to the WTO's new and full subsidy notifications. Notifications are indexed by country, date of publication, symbol, period in which the subsidies are reported, and - though it should not be considered exhaustive - the sectors to which subsidies have been granted." References

400

Databases  

Science Conference Proceedings (OSTI)

... MIL-HDBK-5H: Metallic Materials and Elements for Aerospace Vehicle ... Electric Power Research Institute, 2003, 0, 956, Lynette Karabin, 2/9/2007 6:35 AM

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Energy Citations Database (ECD) - Availability  

Office of Scientific and Technical Information (OSTI)

The Energy Citations Database (ECD) contains over 2.4 million bibliographic The Energy Citations Database (ECD) contains over 2.4 million bibliographic citations and over 307,000 full-text documents, primarily from 1943 forward. When an electronic document is available, an indicator is provided in the search results and on the bibliographic citation page. The electronic document may be accessed via a link to the document. To view an electronic document, click on the icon. (You must have Adobe Acrobat Reader plug-in [exit federal site] installed.) To download an electronic document, right-click on the icon and choose "Save Link As" or "Save Target As". In general, when an electronic document is not available, document availability information may be found on the Bibliographic Citation page in the Availability, Publisher, Author, Research Organization, and/or Resource

402

Automatic Library Tracking Database Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Libraries » ALTD Libraries » ALTD ALTD Automatic Library Tracking Database Infrastructure To track and monitor library usage and better serve your software needs, we have enabled the Automatic Library Tracking Database (ALTD) on our prodcution systems, Hopper and Edison. ALTD is also availailable on Carver, but has not enabled for all users by default yet. ALTD, developed by National Institute for Computational Sciences, automatically and transparently tracks all libraries linked into an application at compile time, as well as the libraries used at run time, by intercepting the linker (ld) and the job launcher (aprun, or mpirun). It is a light-weight tool, and should not change your experience with compilation and execution of codes on the machine. However, if you encounter any problems due to ALTD,

403

Energy Citations Database (ECD) - Architecture  

Office of Scientific and Technical Information (OSTI)

Search Architecture - What Is under the hood? Search Architecture - What Is under the hood? The Energy Citations Database makes searchable over two million bibliographic citations for energy and energy related STI from the Department of Energy (DOE) and its predecessor agencies. This search is powered by traditional Web-based architecture. That is, a database and a set of citations are made searchable by a series of dynamic Web pages with persistent URLs (Web addresses). If a citation has associated full text then that content is also indexed and made searchable. The information consumer may perform a search against the entire record, both bibliographic citations and their associated full text, from the Basic Search feature. In addition, the user may perform fine grain searches by specific bibliographic citation fields and/or full text via the Fielded

404

Technical Database | OpenEI  

Open Energy Info (EERE)

56 56 Varnish cache server Browse Upload data GDR 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 2142281756 Varnish cache server Technical Database Dataset Summary Description Technical Reference for Hydrogen Compatibility of Materials Source Sandia National Laboratories Date Released June 03rd, 2010 (4 years ago) Date Updated September 27th, 2012 (2 years ago) Keywords Compatibility of Materials hydrogen NREL Sandia Technical Database Technical Reference Data application/vnd.openxmlformats-officedocument.spreadsheetml.sheet icon 1100_cia85_ten_fra_fat.xlsx (xlsx, 60.9 KiB) application/vnd.openxmlformats-officedocument.spreadsheetml.sheet icon 1100_san10_fra_fat.xlsx (xlsx, 58.5 KiB) application/vnd.openxmlformats-officedocument.spreadsheetml.sheet icon 1100_san10b_fra_fat.xlsx (xlsx, 59.4 KiB)

405

NETL: 2010 World Gasification Database Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

Home > Technologies > Coal & Power Systems > Gasification Systems > 2010 World Gasification Database Home > Technologies > Coal & Power Systems > Gasification Systems > 2010 World Gasification Database Gasification Systems 2010 Worldwide Gasification Database Archive DOE/NETL 2010 Worldwide Gasification Database Worldwide Gasification Database Analysis The 2010 Worldwide Gasification Database describes the current world gasification industry and identifies near-term planned capacity additions. The database lists gasification projects and includes information (e.g., plant location, number and type of gasifiers, syngas capacity, feedstock, and products). The database reveals that the worldwide gasification capacity has continued to grow for the past several decades and is now at 70,817 megawatts thermal (MWth) of syngas output at 144 operating plants with a total of 412 gasifiers.

406

Coal Power Plant Database | Open Energy Information  

Open Energy Info (EERE)

Power Plant Database Power Plant Database Jump to: navigation, search Name Coal Power Plant Database Data Format Excel Spreadsheet, Excel Pivot Table, Access Database Geographic Scope United States TODO: Import actual dataset contents into OpenEI The Coal Power Plant Database (CPPDB) is a dataset which "consolidates large quantities of information on coal-fired power plants in a single location."[1] It is produced by the National Energy Technology Laboratory (NETL). External links 2007 Edition Excel Spreadsheet Excel Pivot Table Access Database User's Manual (PDF) References ↑ "User's Manual: Coal Power Plant Database" Retrieved from "http://en.openei.org/w/index.php?title=Coal_Power_Plant_Database&oldid=273301" Categories: Datasets Articles with outstanding TODO tasks

407

Energy Citations Database (ECD) - Home Page  

Office of Scientific and Technical Information (OSTI)

SEARCH Search the Database: Search FEATURE SciTech Connect Search SciTech Connect, a consolidation of Information Bridge and Energy Citations Database, incorporating all the R&D...

408

Workload-Aware Database Monitoring and Consolidation  

E-Print Network (OSTI)

In most enterprises, databases are deployed on dedicated database servers. Often, these servers are underutilized much of the time. For example, in traces from almost 200 production servers from different organizations, ...

Curino, Carlo

409

Stepwise specification of dynamic database behaviour  

Science Conference Proceedings (OSTI)

This paper presents a methodology for the stepwise specification of dynamic database behaviour. A conceptual schema is described in three levels: data, objects and transactions. To determine which sequences of database states are “admissible”, ...

Udo W. Lipeck

1986-06-01T23:59:59.000Z

410

Database of Mechanical Properties for Textile Composites  

Science Conference Proceedings (OSTI)

This report describes the approach followed to develop a database for mechanical properties of textile composites. The data in this database is assembled from NASA Advanced Composites Technology (ACT) programs and from data in the public domain. This ...

Delbrey J.

1996-08-01T23:59:59.000Z

411

NETL Carbon Capture and Storage Database  

NLE Websites -- All DOE Office Websites (Extended Search)

or new projects are released to the public. Access to the database requires use of Google Earth. The NETL CCS database is a layer in Google Earth. Free downloadable software...

412

Database Support for Probabilistic Attributes and Tuples  

Science Conference Proceedings (OSTI)

The inherent uncertainty of data present in numerous applications such as sensor databases, text annotations, and information retrieval motivate the need to handle imprecise data at the database level. Uncertainty can be at the attribute or tuple level ...

Sarvjeet Singh; Chris Mayfield; Rahul Shah; Sunil Prabhakar; Susanne Hambrusch; Jennifer Neville; Reynold Cheng

2008-04-01T23:59:59.000Z

413

WEB RESOURCE: Aerospace Structural Materials Database - TMS  

Science Conference Proceedings (OSTI)

Oct 29, 2007 ... The Aerospace Structural Materials Database (ASMD) was developed by CINDAS LLC under a Cooperative Research and Development ...

414

1991-2005 National Solar Radiation Database  

DOE Green Energy (OSTI)

This fact sheet provides an overview of the purpose, benefit, and features of the newly updated National Solar Radiation Database.

Wilcox, S.

2007-05-01T23:59:59.000Z

415

National Vulnerability Database Full Vulnerability Listing  

Science Conference Proceedings (OSTI)

NVD Complete Vulnerability Listing. This web page contains direct links to every National Vulnerability Database vulnerability entry. ...

416

Selected Research Issues in Decision Support Databases  

Science Conference Proceedings (OSTI)

A flurry of buzzwords awaits anyone investigating database technology for decision support: data warehouse, multidimensional and dimensional database, on-line analytical processing, star schema, slicing, dicing, drill-down and roll-up. We introduce ... Keywords: data warehouse, databases, decision-support, dimensional, multidimensional

David Maier; Mary Edie Meredith; Leonard Shapiro

1998-09-01T23:59:59.000Z

417

NIST STandard Reference Database 100  

Science Conference Proceedings (OSTI)

... intensities as well as the energy and angular ... improvements in the peak-management software; and ... intensities with X-ray energies higher than ...

2013-07-12T23:59:59.000Z

418

Best Practices for Planned Maintenance.......................................... 10 Best Practices for Maximum ROI...................................................... 10 Best Practices for Migrating to Sun Oracle Database Machine........ 11 Best Practic  

E-Print Network (OSTI)

Sun Oracle Database Machine provides an optimal solution for all database workloads, ranging from scan-intensive data warehouse applications to highly concurrent OLTP applications. With its combination of smart Oracle Exadata Storage Server Software, complete and intelligent Oracle Database software, and the latest industry standard hardware components from Sun, the Database Machine delivers extreme performance in a highly available and highly secure environment. Oracle Data Guard is Oracle’s disaster recovery solution prescribed by the Maximum Availability Architecture (MAA) to protect mission critical databases residing on Sun Oracle Database Machine and the Exadata Storage Server. Using Data Guard is also the MAA best practice for minimizing planned downtime by upgrading the Oracle Database in a rolling fashion. Data Guard is included with Oracle Database Enterprise Edition and provides the management, monitoring, and automation software to create and maintain one or more synchronized standby databases that protect data from failures, disasters, errors, and

Data Guard; Sun Oracle; Database Machine

2010-01-01T23:59:59.000Z

419

DOE Science Showcase - Featured Climate Change Research from DOE Databases  

Office of Scientific and Technical Information (OSTI)

Featured Climate Change Research from DOE Databases Featured Climate Change Research from DOE Databases Search Results from DOE Databases View research documents, citations, accomplishments, patents, and projects related to climate change, one of the primary scientific challenges addressed through the Incite Program. Climate Change Information Bridge Energy Citations Database DOE R&D Accomplishments Database DOE Data Explorer Climate Modeling Information Bridge Energy Citations Database DOE R&D Accomplishments Database DOE Data Explorer Ocean Turbulence and Climate Information Bridge Energy Citations Database DOE Accomplishments Database DOE Data Explorer Cloud Simulation and Models Information Bridge Energy Citations Database DOE Accomplishments Database DOE Data Explorer Global Warming Information Bridge Energy Citations Database

420

Fact Sheet: Energy Storage Database (October 2012) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Storage Database (October 2012) Fact Sheet: Energy Storage Database (October 2012) DOE and Sandia National Laboratories are developing a database of energy storage projects...

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)  

SciTech Connect

The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

2000-01-27T23:59:59.000Z

422

Enhancing the DNA Patent Database  

Science Conference Proceedings (OSTI)

Final Report on Award No. DE-FG0201ER63171 Principal Investigator: LeRoy B. Walters February 18, 2008 This project successfully completed its goal of surveying and reporting on the DNA patenting and licensing policies at 30 major U.S. academic institutions. The report of survey results was published in the January 2006 issue of Nature Biotechnology under the title “The Licensing of DNA Patents by US Academic Institutions: An Empirical Survey.” Lori Pressman was the lead author on this feature article. A PDF reprint of the article will be submitted to our Program Officer under separate cover. The project team has continued to update the DNA Patent Database on a weekly basis since the conclusion of the project. The database can be accessed at dnapatents.georgetown.edu. This database provides a valuable research tool for academic researchers, policymakers, and citizens. A report entitled Reaping the Benefits of Genomic and Proteomic Research: Intellectual Property Rights, Innovation, and Public Health was published in 2006 by the Committee on Intellectual Property Rights in Genomic and Protein Research and Innovation, Board on Science, Technology, and Economic Policy at the National Academies. The report was edited by Stephen A. Merrill and Anne-Marie Mazza. This report employed and then adapted the methodology developed by our research project and quoted our findings at several points. (The full report can be viewed online at the following URL: http://www.nap.edu/openbook.php?record_id=11487&page=R1). My colleagues and I are grateful for the research support of the ELSI program at the U.S. Department of Energy.

Walters, LeRoy B.

2008-02-18T23:59:59.000Z

423

DOE to Unveil New Online Database of Oil and Natural Gas Research Results |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE to Unveil New Online Database of Oil and Natural Gas Research DOE to Unveil New Online Database of Oil and Natural Gas Research Results DOE to Unveil New Online Database of Oil and Natural Gas Research Results October 2, 2009 - 1:00pm Addthis Washington, DC - The U.S. Department of Energy plans to introduce a new, user-friendly online repository of oil and natural gas research results at the Society of Petroleum Engineers' Annual Technical Conference and Exhibition, to be held in New Orleans, La., October 4-7, 2009. By providing easy access to the results of nearly four decades of research supported by the Office of Fossil Energy's Oil and Natural Gas Program, the knowledge management database could ultimately help boost recovery of the nation's oil and gas resources. The database largely evolved from a recommendation made by the Federal

424

Data dictionary and discussion for the midnite mine GIS database. Report of investigations/1996  

SciTech Connect

A geographic information system (GIS) database has been developed by the U.S. Bureau of Mines (USBM) for the Midnite Mine and surroundings in northeastern Washington State (Stevens County) on the Spokane Indian Reservation. The GIS database was compiled to serve as a repository and source of historical and research information on the mine site. The database also will be used by the Bureau of Land Management and the Bureau of Indian Affairs (as well as others) for environmental assessment and reclamation planning for future remediation and reclamation of the site. This report describes the data in the GIS database and their characteristics. The report also discusses known backgrounds on the data sets and any special considerations encountered by the USBM in developing the database.

Peters, D.C.; Smith, M.A.; Ferderer, D.A.

1996-01-18T23:59:59.000Z

425

Lessons Learned Database | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lessons Learned Database Lessons Learned Database Lessons Learned Database The DOE Corporate Lessons Learned Database provides a central clearinghouse that allows ready access to and communication about collected information on a timely, unimpeded basis by all DOE elements. The database is used to collect and share lessons learned and best practices pertaining to all DOE activities Lessons Learned Database Login Welcome to the Lessons Learned site, the premier Web tool for online information sharing regarding Lessons Learned issues. Please login to access your profile, search the database, or submit a new Lesson Learned. User Log In: If you have already received your log in credentials for the DOE Lessons Learned system click here to log in. Create New Account: We do not allow anonymous access to this site. You must register for an

426

Status Report on the Creation of a Preliminary Data Model and Dictionary for a New Petrologic Database  

Science Conference Proceedings (OSTI)

A preliminary database has been developed that will allow mineralogy and bulk-rock geochemical information to be managed under configuration control and facilitate electronic querying. The database is currently developed in Microsoft Access as a collection of tables, views, and entry forms. Each field and table has been described in a data dictionary.

Mackley, Rob D.; Serkowski, John A.; Last, George V.

2008-06-30T23:59:59.000Z

427

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

428

Energy science and technology database (on the internet). Online data  

SciTech Connect

The Energy Science and Technology Database (EDB) is a multidisciplinary file containing worldwide references to basic and applied scientific and technical research literature. The information is collected for use by government managers, researchers at the national laboratories, and other research efforts sponsored by the U.S. Department of Energy, and the results of this research are transferred to the public. Abstracts are included for records from 1976 to the present. The EDB also contains the Nuclear Science Abstracts which is a comprehensive abstract and index collection to the international nuclear science and technology literature for the period 1948 through 1976. Included are scientific and technical reports of the U.S. Atomic Energy Commission, U.S. Energy Research and Development Administration and its contractors, other agencies, universities, and industrial and research organizations. Approximately 25% of the records in the file contain abstracts. Nuclear Science Abstracts contains over 900,000 bibliographic records. The entire Energy Science and Technology Database contains over 3 million bibliographic records. This database is now available for searching through the GOV. Research-Center (GRC) service. GRC is a single online web-based search service to well known Government databases. Featuring powerful search and retrieval software, GRC is an important research tool. The GRC web site is at http://grc.ntis.gov.

NONE

1997-12-01T23:59:59.000Z

429

Integrated Requirements Management System and System Design Description  

Science Conference Proceedings (OSTI)

This document provides a System Design Description (SDD) for the Integrated Requirements Management System (IRMS) database. The database manager chosen for this task was the Dynamic Object Oriented Requirements System (DOORS) Version 5.0 or greater. The schema for the IRMS is described with respect to the CH2M Hill Hanford Group, Inc requirements management processes.

ACREE, C.D.

2001-03-27T23:59:59.000Z

430

Database Maintenance, Data Sharing Policy, Collaboration  

SciTech Connect

Scientific questions of today are now more global than ever before. The answers to these questions are buried within multiple disciplines and across a diverse range of scientists and institutions. The expanse and complexity of data required by researchers often exceed the means of a single scientist. Data sharing in the form of its distributed collection and analysis is increasingly common. Collective research now takes place in what may be called 'collaboratories' or in 'centers without walls' (Clery 2006). Creating effective artifacts, which enable scientists to collaborate on data analyses, continues to be a significant challenge for today's science activities. It is rare that providing a file system abstraction on distributed data enables acceleration of scientific discoveries. By explicitly identifying and addressing the different requirements for data contributors, data curators, and data consumers, we can create a data management architecture which enables the creation of datasets that evolve over time with growing and changing data, data annotations, participants, and use rules. This involves also a crucial contribution by the teams and people collecting the data, that in addition to carefully acquire and process the measurements and to be ready to share their measurements within the scientific community, need to follow general rules that help to make their data well documented and safely stored and to maximize visibility to their works and sites. In this chapter, we provide examples of the types of functions and capabilities typically provided within the data management systems, focusing in particular on databases structures and characteristics, data practices, and data user services. Finally, the importance and advantages of collective efforts like data sharing for synthesis activities and the relative data policy options are discussed and analyzed.

Papale, D. [University of Tuscia; Agarwal, D.A [Lawrence Berkeley National Laboratory (LBNL); Baldocchi, D. D. [University of California, Berkeley; Cook, Robert B [ORNL; Fisher, J.B. [Jet Propulsion Laboratory, Pasadena, CA; Ingen, C. van [Microsoft Research

2012-01-01T23:59:59.000Z

431

Testing systems database interface users manual  

SciTech Connect

A joint-service effort is under way to develop, evaluate, and field-test a Computerized Adaptive Testing version of the Armed Services Vocational Aptitude Battery (CAT-ASVAB). The CAT-ASVAB is being evaluated as a replacement for the Paper and Pencil ASVAB (P P-ASVAB), which is currently used for military personnel selection and classification. During the Score Equating Development (SED) phase of the evaluation, the CAT-ASVAB is being administered at a limited number of Military Entrance Processing Stations (MEPS). At these stations all examinees are given a P P operational ASVAB; in addition, approximately one-third are given a P P non-operational ASVAB and two-thirds are given the CAT-ASVAB. Data are being transmitted from the MEPS to the CAT-ASVAB Maintenance and Psychometric (CAMP) Facility for analysis and storage. The CAMP Facility supports the development, maintenance, and continuing improvement of the CAT-ASVAB testing program. The Pacific Northwest Laboratory (PNL) was contracted by the Navy Personnel and Development Center (NPRDC) to provide software for enhancing the NPRDC CAMP facility. The objective of this Users Manual is to provide an overview of the Testing Systems Database (TSD) Interface, which is designed to support the transfer, quality assurance, analysis, and maintenance of data pertaining to the evaluation of the CAT-ASVAB. This document provides the general management and personnel who are not automated data processing staff with the information necessary to understand the system.

Olander, M.

1989-05-01T23:59:59.000Z

432

Workshop on Long-term Preservation & Management of ...  

Science Conference Proceedings (OSTI)

... Ph.D., is Vice President and Chief Information Officer at The ... Management Executives (CHIME) CIO Boot Camp ... strategy for the database for the life ...

433

U-021: Cisco Unified Communications Manager Directory Traversal...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents...

434

Independent Oversight Inspection of Emergency Management at the...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

required to contact ERD in such cases. ERD EPHA developers also have the capability to query the LANL chemical management database (CHEMLOG), which has been programmed to compare...

435

Energy Citations Database (ECD) - Help  

Office of Scientific and Technical Information (OSTI)

Help Help Alerts Basic Search Fielded Search - Sorting - Term searching - Author select - Subject select - Limit to - Date searching Search Tips - General - Case sensitivity - Drop-down menus - Report number searching - Wildcard operators - Phrase/adjacent term searching - Boolean Technical Requirements Search Results - Results - Using the check box - Bibliographic citations - View and download full text - Capture Citations Using Zotero - Download citations using EndNote ECD FAQs Alerts Help Alerts FAQs OSTI FAQs Alerts Alerts provide users with e-mail notification of updates to the Energy Citations Database in specific areas of interest. In order to receive Alerts, you must register. For assistance with Alerts, please see the Alerts Help and Alerts FAQ. Basic Search Enter your search term (s) in the search box and your search will be

436

Catalog of databases and reports  

SciTech Connect

This catalog provides information about the many reports and materials made available by the US Department of Energy`s (DOE`s) Global Change Research Program (GCRP) and the Carbon Dioxide Information Analysis Center (CDIAC). The catalog is divided into nine sections plus the author and title indexes: Section A--US Department of Energy Global Change Research Program Research Plans and Summaries; Section B--US Department of Energy Global Change Research Program Technical Reports; Section C--US Department of Energy Atmospheric Radiation Measurement (ARM) Program Reports; Section D--Other US Department of Energy Reports; Section E--CDIAC Reports; Section F--CDIAC Numeric Data and Computer Model Distribution; Section G--Other Databases Distributed by CDIAC; Section H--US Department of Agriculture Reports on Response of Vegetation to Carbon Dioxide; and Section I--Other Publications.

Burtis, M.D. [comp.

1997-04-01T23:59:59.000Z

437

Buildings Performance Database | OpenEI  

Open Energy Info (EERE)

Buildings Performance Database Buildings Performance Database Dataset Summary Description This is a non-proprietary subset of DOE's Buildings Performance Database. Buildings from the cities of Dayton, OH and Gainesville, FL areas are provided as an example of the data in full database. Sample data here is formatted as CSV Source Department of Energy's Buildings Performance Database Date Released July 09th, 2012 (2 years ago) Date Updated Unknown Keywords Buildings Performance Database Dayton Electricity Gainesville Natural Gas open data Residential Data application/zip icon BPD Dayton and Gainesville Residential csv files in a zip file (zip, 2.8 MiB) text/csv icon BPD Dayton and Gainesville Residential Building Characteristics data (csv, 1.4 MiB) text/csv icon BPD Dayton and Gainesville Residential data headers (csv, 5.8 KiB)

438

Life Cycle Inventory Database | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Commercial Buildings » Research Projects » Life Cycle Inventory Commercial Buildings » Research Projects » Life Cycle Inventory Database Life Cycle Inventory Database The U.S. Life Cycle Inventory (LCI) Database serves as a central repository for information about the total energy and resource impacts of developing and using various commercial building materials, components, and assemblies. The database helps manufacturers, building designers, and developers select energy-efficient and environmentally friendly materials, products, and processes for their projects based on the environmental impact of an item over its entire lifespan. The U.S. Department of Energy and the National Renewable Energy Laboratory (NREL) developed the database in 2003 with input from a variety of partners. NREL maintains and updates the database with support from the

439

Hydrologic database user`s manual  

SciTech Connect

The Hydrologic Database is an electronic filing cabinet containing water-related data for the Nevada Test Site (NTS). The purpose of the database is to enhance research on hydrologic issues at the NTS by providing efficient access to information gathered by a variety of scientists. Data are often generated for specific projects and are reported to DOE in the context of specific project goals. The originators of the database recognized that much of this information has a general value that transcends project-specific requirements. Allowing researchers access to information generated by a wide variety of projects can prevent needless duplication of data-gathering efforts and can augment new data collection and interpretation. In addition, collecting this information in the database ensures that the results are not lost at the end of discrete projects as long as the database is actively maintained. This document is a guide to using the database.

Champman, J.B.; Gray, K.J.; Thompson, C.B.

1993-09-01T23:59:59.000Z

440

Substation Sensor Database Version 1.0  

Science Conference Proceedings (OSTI)

The Substation Sensor database provides utilities with a searchable list of sensors available to be applied in substation applications. The Substation Sensor Database provides a searchable database of sensors available to substation engineers, categorized by Area, Component, Sub-Component, Parameter, and Technology. By specifying each category, the list can be filtered to a sub-set of sensors. By clicking on a sensorname, details can be viewed including a description, sensor maturity, and a link to the m...

2010-11-10T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Transparent Cost Database | Open Energy Information  

Open Energy Info (EERE)

Transparent Cost Database Transparent Cost Database Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Transparent Cost Database Agency/Company /Organization: Department of Energy Partner: National Renewable Energy Laboratory Sector: Energy Focus Area: Renewable Energy, Solar, Transportation Topics: Baseline projection, Low emission development planning, -LEDS, Resource assessment, Technology characterizations Resource Type: Dataset, Lessons learned/best practices, Software/modeling tools User Interface: Website Web Application Link: en.openei.org/apps/TCDB/ Cost: Free OpenEI Keyword(s): Featured Equivalent URI: cleanenergysolutions.org/content/united-states-transparent-cost-databa Language: English The Transparent Cost Database collects program cost and performance

442

Biological and Environmental Research (BER) Abstracts Database  

Office of Scientific and Technical Information (OSTI)

Future (improving the ability to understand, predict, and mitigate the impacts of energy production and use on climate change). The BER Abstracts Database is publicly...

443

NIST: Electron-Impact Cross Section Database  

Science Conference Proceedings (OSTI)

... of molecules by electron impact. The database also includes cross sections for some atoms and energy distributions of ejected electrons for H, He ...

2011-12-09T23:59:59.000Z

444

HANFORD NUCLEAR CRITICALITY SAFETY PROGRAM DATABASE  

Science Conference Proceedings (OSTI)

The Hanford Database is a useful information retrieval tool for a criticality safety practitioner. The database contains nuclear criticality literature screened for parameter studies. The entries, characterized with a value index, are segregated into 16 major and six minor categories. A majority of the screened entries have abstracts and a limited number are connected to the Office of Scientific and Technology Information (OSTI) database of full-size documents. Simple and complex searches of the data can be accomplished very rapidly and the end-product of the searches could be a full-size document. The paper contains a description of the database, user instructions, and a number of examples.

TOFFER, H.

2005-05-02T23:59:59.000Z

445

NIST Standard Reference Database Available for Purchase  

Science Conference Proceedings (OSTI)

... for their own duties, tax, and VAT. ... NIST/EPA Gas-Phase Infrared; JCAMP Format. $150. ... NIST/ThermoData Engine Database - Pure Compounds. ...

2013-12-03T23:59:59.000Z

446

Biological and Environmental Research (BER) Abstracts Database...  

Office of Scientific and Technical Information (OSTI)

Future (improving the ability to understand, predict, and mitigate the impacts of energy production and use on climate change). The BER Abstracts Database is publicly...

447

The LBNL Water Heater Retail Price Database  

SciTech Connect

Lawrence Berkeley National Laboratory developed the LBNL Water Heater Price Database to compile and organize information used in the revision of U.S. energy efficiency standards for water heaters. The Database contains all major components that contribute to the consumer cost of water heaters, including basic retail prices, sales taxes, installation costs, and any associated fees. In addition, the Database provides manufacturing data on the features and design characteristics of more than 1100 different water heater models. Data contained in the Database was collected over a two-year period from 1997 to 1999.

Lekov, Alex; Glover, Julie; Lutz, Jim

2000-10-01T23:59:59.000Z

448

Front Vehicle Setup Information Downloadable Dynamometer Database...  

NLE Websites -- All DOE Office Websites (Extended Search)

Chevrolet Volt- 20F Test cell location Front Vehicle Setup Information Downloadable Dynamometer Database (D 3 )- Test Summary Sheet Vehicle architecture EREV Vehicle dynamometer...

449

Recreation Information Database - RIDB | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Recreation Information Database - RIDB Agriculture Community Menu DATA APPS EVENTS DEVELOPER STATISTICS COLLABORATE ABOUT Agriculture You are here Data.gov Communities ...

450

MIDCONTINENT INTERACTIVE DIGITAL CARBON ATLAS AND RELATIONAL DATABASE (MIDCARB)  

Science Conference Proceedings (OSTI)

This annual report describes progress in the second year of the three-year project entitled ''Midcontinent Interactive Digital Carbon Atlas and Relational Database (MIDCARB)''. This project, funded by the Department of Energy, is a cooperative project that assembles a consortium of five states (Indiana, Illinois, Kansas, Kentucky and Ohio) to construct an online distributed Relational Database Management System (RDBMS) and Geographic Information System (GIS) covering aspects of carbon dioxide geologic sequestration (http://www.midcarb.org). The system links the five states in the consortium into a coordinated regional database system consisting of datasets useful to industry, regulators and the public. The project is providing advanced distributed computing solutions to link database servers across the five states into a single system where data is maintained at the local level but is accessed through a single Web portal and can be queried, assembled, analyzed and displayed. Each individual state has strengths in data gathering, data manipulation and data display, including GIS mapping, custom application development, web development, and database design. Sharing of expertise provides the critical mass of technical expertise to improve CO{sub 2} databases and data access in all states. This project improves the flow of data across servers in the five states and increases the amount and quality of available digital data. Data is being assembled to analyze CO{sub 2} sequestration potential from a single object (e.g., power plant or well) to a region and across geographic boundaries. The MIDCARB system is robust and capable of being updated from multiple sources on a daily basis. The MIDCARB project has developed improved online tools to provide real-time display and analysis of CO{sub 2} sequestration data. The MIDCARB project is a functional template for distributed data systems to address CO{sub 2} sequestration and other natural resource issues that cross the boundaries between institutions and geographic areas. The system links together data from sources, sinks and transportation within a spatial database that can be queried online. Visualization of high quality and current data can assist decision makers by providing access to common sets of high quality data in a consistent manner.

Timothy R. Carr; Scott W. White

2003-07-01T23:59:59.000Z

451

Environmental Factor(tm) system: Superfund site information from five EPA databases (on cd-rom). Database  

Science Conference Proceedings (OSTI)

Environmental Factor puts today`s technology to work to provide a better, more cost-efficient and time-saving way to access EPA information on hazardous waste sites. Environmental consultants, insurers, and reinsurers, corporate risk assessors and companies actively involved in the generation, transport, storage or cleanup of hazardous waste materials can use its user-friendly information retrieval system to gain rapid access to vital information in immediately-usable form. Search, retrieve, and export information in real time. No more waiting for the mail or overnight delivery services to deliver hard copies of voluminous listings and individual site reports. More than 200,000 pages of EPA hazardous waste site information are contained in 5 related databases: (1) Site data from the National Priority List (NPL) and CERCLIS databases, Potentially Responsible Parties (PRP) and Records of Decision (RODs) summaries; (2) Complete PRP information; (3) EPA Records of Decision (Full Text); (4) entire Civil Enforcement Docket; and (5) Glossary of EPA terms, abbreviations and acronyms. Environmental Factor`s powerful database management engine gives even the most inexperienced computer user extensive search capabilities, including wildcard, phonetic and direct cross reference searches across multiple databases. The first menu option delivers information from the NPL, CERCLIS site data, PRP and RODs summary information. Enter a set of search criteria and then immediately access displays containing information from all of these databases. Get full PRP information and Full Text RODs by using their respective menu options. If your search turns up multiple items, a list of site names appears. To bring up the data, highlight the specific site you want and hit Enter. That`s how easy it is to access the vast amount of data stored in the Environmental Factor CD-ROM.

NONE

1996-07-01T23:59:59.000Z

452

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database...

453

Student, Faculty, & StaFF Support active directory: Centralized directory service used to manage  

E-Print Network (OSTI)

Management System (uMcontent): Web content management system, which supports the design and maintenance): Relational database management system that offers data compression and disaster recovery functions data and accounts management eresearch: Electronic research database systems with web-based forms and tools

Amin, S. Massoud

454

Artificial Intelligence Tools for Failure Event Database Management ...  

Science Conference Proceedings (OSTI)

According the a 2000 NRC report (NUREG/CR6674), a fatigue modeling result showed that "cracks initiate rather early in the plant life. There is about a ...

455

Management and analysis of Chinese database extracted knowledge  

Science Conference Proceedings (OSTI)

China is an arising country, not only economicaly, but also scientifically. Being aware of the day to day evolution of this emerging country implicates to be able to read the local news, in Chinese langage. In this article we propose to use classical ... Keywords: China, business intelligence, data mining, data warehouse, evolution, knowledge extraction, relational analysis

Nadčge Guénec; Eloise Loubier; Ilhčme Ghalamallah; Bernard Dousset

2008-09-01T23:59:59.000Z

456

Access Control for a Replica Management Database Justin M. Wozniak  

E-Print Network (OSTI)

commodity hardware may be cataloged into a unified, high- utilization system. Such widely distributed-59593-552-5/06/0010 ...$5.00. massively parallel computing infrastructure, capable of pro- cessing vast amounts of user data. A variety of options exist to parallelize and distribute stor- age over clusters or grids, but several

Thain, Douglas

457

A Progressive Network Management Architecture Enabled By Java Technology  

E-Print Network (OSTI)

This paper proposes a framework based completely on Java technology. The advantages brought about by the use of Java in network management answer some critical problems existing in current systems. With this work we address several factors concerning interoperability and security in heterogeneous network environments. Specifically, we present a manager application and a multithreaded agent engine that make use of a lightweight communication mechanism for message exchange. A MIB parser is introduced to accelerate handling of incoming management requests, and the RSA public-key cryptosystem is implemented to provide both encryption and authentication features. Results, measured in terms of response time, compare favourably with other published work and standard management frameworks.

Gavalas, Damianos; Ghanbari, Mohammed; O'Mahony, Mike

2010-01-01T23:59:59.000Z

458

Database Applications to Integrate Beam Line Optics Changes with the Engineering Databases  

SciTech Connect

The LCLS project databases provide key nomenclature information while integrating many engineering and physics processes in the building of an accelerator. Starting with the elements existing in the beam line optics files, the engineers add non-beam-line elements, and controls engineers assign ''Formal Device Names'' to these elements. Inventory, power supplies, racks, crates and cable plants are databases that are being integrated into the project database. This approach replaces individual spreadsheets and/or integrates standalone existing institutional databases.

Chan, A.; Bellomo, P.; Crane, G.R.; Emma, P.; Grunhaus, E.; Luchini, K.; MacGregor, I.A.; Marsh, D.S.; Pope, R.; Prickett, P.; Rago, C.; Ratcliffe, K.; Shab, T.; /SLAC

2007-07-06T23:59:59.000Z

459

Sealion Database: Tracking and Characterization of Legacy Wastes  

Science Conference Proceedings (OSTI)

The Radioactive Scrap and Waste Facility Liner-by-Liner Characterization Project was initiated to support waste management planning and disposition activities at the Materials and Fuels Complex located at the Idaho National Laboratory. The project scope consisted of a detailed examination of available historical records to consolidate information and eliminate discrepancies between sources. This information was captured in a new comprehensive searchable online database dubbed Sealion (Searchable Liner Online). For each storage liner and associated waste container, Sealion tracks the physical configuration, radiological data (e.g., source term, transuranic content, fissile content, and direct gamma radiation reading), Resource Conservation and Recovery Act characterization data, contents descriptions, and a variety of other waste management data. Historical hard-copy records were scanned and are stored in the database for easy access. In addition to storing the consolidated data in a library for easy retrieval or linking, Sealion serves as a tool in the development of batching plans for retrieving, transporting, processing, and, ultimately, dispositioning the waste. An integral search function allows the user to query for a variety of parameters in order to plan custom batches and account for facility or regulatory limitations (e.g., U.S. Department of Transportation limits, hazard category determinations, and fissile gram equivalent limitations). Liners can be combined or batched together and the combined results displayed in real-time graphs and tables showing the cumulative characteristics. The basic database architecture has proven to be adaptable to a variety of other similar applications. Sealion is capable of tracking segmented inventories (i.e., the liners can be replaced with storage drums, racks in a warehouse, or grids overlaid on a landfill). Additionally, the batching functions allow for the ability to combine inventory sub-locations into real-time graphs that summarize the characteristics of the contents for ease in comparison of characteristics to established thresholds or decision-making modeling needed to support waste-management operations.

Michel Hall; Brady Orchard; Brett Welty; James Rivera; Paul Walker; Reese Gannon

2010-03-01T23:59:59.000Z

460

Nuclear Databases: National Resource Nuclear databases consists of carefully organized scientific  

E-Print Network (OSTI)

Nuclear Databases: National Resource Nuclear databases consists of carefully organized scientific information that has been gathered over 50 years of low-energy nuclear physics research worldwide. These powerful databases have enormous value and they represent a genuine national resource. Six core nuclear

Homes, Christopher C.

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

HLDB: location-based services in databases  

Science Conference Proceedings (OSTI)

This paper introduces HLDB, the first practical system that can answer exact spatial queries on continental road networks entirely within a database. HLDB is based on hub labels (HL), the fastest point-to-point algorithm for road networks, and ... Keywords: SQL, databases, large road networks, location services

Ittai Abraham; Daniel Delling; Amos Fiat; Andrew V. Goldberg; Renato F. Werneck

2012-11-01T23:59:59.000Z

462

An introduction to spatial database systems  

Science Conference Proceedings (OSTI)

We propose a definition of a spatial database system as a database system that offers spatial data types in its data model and query language, and supports spatial data types in its implementation, providing at least spatial indexing and spatial join ...

Ralf Hartmut Güting

1994-10-01T23:59:59.000Z

463

Clustering local frequency items in multiple databases  

Science Conference Proceedings (OSTI)

Frequent items could be considered as a basic type of patterns in a database. In the context of multiple data sources, most of the global patterns are based on local frequency items. A multi-branch company transacting from different branches often needs ... Keywords: Association, Clustering, Data mining, Measure of association, Multi-database mining

Animesh Adhikari

2013-07-01T23:59:59.000Z

464

US-LHC MAGNET DATABASE AND CONVENTIONS.  

SciTech Connect

The US-LHC Magnet Database is designed for production-magnet quality assurance, field and alignment error impact analysis, cryostat assembly assistance, and ring installation assistance. The database consists of tables designed to store magnet field and alignment measurements data and quench data. This information will also be essential for future machine operations including local IR corrections.

WEI,J.; MCCHESNEY,D.; JAIN,A.; PEGGS,S.; PILAT,F.; BOTTURA,L.; SABBI,G.

1999-03-29T23:59:59.000Z

465

A multimodal database for mimicry analysis  

Science Conference Proceedings (OSTI)

In this paper we introduce a multi-modal database for the analysis of human interaction, in particular mimicry, and elaborate on the theoretical hypotheses of the relationship between the occurrence of mimicry and human affect. The recorded experiments ... Keywords: affective computing, annotation, interaction scenario, mimicry database, social signal processing, synchronized multi-sensor recording

Xiaofan Sun; Jeroen Lichtenauer; Michel Valstar; Anton Nijholt; Maja Pantic

2011-10-01T23:59:59.000Z

466

CALIFORNIA ENERGY Small HVAC Database Of Monitored  

E-Print Network (OSTI)

CALIFORNIA ENERGY COMMISSION Small HVAC Database Of Monitored Information Database of Compiled of the Integrated Design of Small Commercial HVAC Systems research project. The reports are a result of funding: Productivity and Interior Environments Integrated Design of Large Commercial HVAC Systems Integrated Design

467

Reverse skyline search in uncertain databases  

Science Conference Proceedings (OSTI)

Reverse skyline queries over uncertain databases have many important applications such as sensor data monitoring and business planning. Due to the wide existence of uncertainty in many real-world data, answering reverse skyline queries accurately and ... Keywords: Uncertain database, bichromatic reverse skyline, monochromatic reverse skyline

Xiang Lian; Lei Chen

2010-02-01T23:59:59.000Z

468

Nama Database Wiki | Open Energy Information  

Open Energy Info (EERE)

Nama Database Wiki Nama Database Wiki Jump to: navigation, search Tool Summary LAUNCH TOOL Name: NAMA Database Wiki Agency/Company /Organization: Ecofys Sector: Climate, Energy Focus Area: Renewable Energy, Greenhouse Gas Phase: Evaluate Options, Develop Goals, Prepare a Plan Topics: Finance, Low emission development planning, -NAMA Resource Type: Guide/manual, Lessons learned/best practices, Training materials User Interface: Website Complexity/Ease of Use: Simple Website: www.nama-database.org/ The NAMA Database is an expanding resource containing the latest activities taking place around the world on Nationally Appropriate Mitigation Actions (NAMAs). The mission is to create a valuable resource for policy makers, researchers and other interested stakeholders to increase knowledge-sharing

469

Global Renewable Energy Database | Open Energy Information  

Open Energy Info (EERE)

Global Renewable Energy Database Global Renewable Energy Database Jump to: navigation, search Tool Summary Name: Global Renewable Energy Database Agency/Company /Organization: German Aerospace Center (DLR) Sector: Energy Focus Area: Renewable Energy, Solar, Wind Topics: Resource assessment Resource Type: Dataset, Maps Website: www.dlr.de/en/ References: DLR website [1] From 2009-2010 the German Aerospace Center (DLR) will inventory renewable energy resources for energy modeling in impact assessment models which will feed into a database of renewable energy resources in 0.45° spatial and 1h temporal resolution. References ↑ "DLR website" Retrieved from "http://en.openei.org/w/index.php?title=Global_Renewable_Energy_Database&oldid=328731" Category: Tools What links here

470

International Forest Policy Database | Open Energy Information  

Open Energy Info (EERE)

International Forest Policy Database International Forest Policy Database Jump to: navigation, search Tool Summary LAUNCH TOOL Name: International Forest Policy Database Agency/Company /Organization: GTZ Sector: Land Focus Area: Forestry Topics: Policies/deployment programs Resource Type: Dataset Website: www.etfrn.org/etfrn/topics/policy/index.html International Forest Policy Database Screenshot References: GTZ International Forest Policy Database[1] Overview "This topic page is being developed in cooperation with GTZ-IWP, the International Forest Policy project of the German organisation for international cooperation. GTZ-IWP has contributed considerably to the ETFRN NEWS 41/42 on national forest programmes. During this cooperation both GTZ and ETFRN identified a need for a central point of access to information on international forest

471

Verified implementations of the information card federated identity-management protocol  

Science Conference Proceedings (OSTI)

We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card Profile V1.0. Our code can interoperate with existing implementations of the roles of the protocol (client, identity ... Keywords: CardSpace, cryptographic protocol verification, federated identity management, verified implementations, web services security

Karthikeyan Bhargavan; Cédric Fournet; Andrew D. Gordon; Nikhil Swamy

2008-03-01T23:59:59.000Z

472

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

473

(BARS) -- Bibliographic Retrieval System Sandia Shock Compression (SSC) database Shock Physics Index (SPHINX) database. Volume 1: UNIX version query guide customized application for INGRES  

SciTech Connect

The Bibliographic Retrieval System (BARS) is a data base management system specially designed to retrieve bibliographic references. Two databases are available, (i) the Sandia Shock Compression (SSC) database which contains over 5700 references to the literature related to stress waves in solids and their applications, and (ii) the Shock Physics Index (SPHINX) which includes over 8000 further references to stress waves in solids, material properties at intermediate and low rates, ballistic and hypervelocity impact, and explosive or shock fabrication methods. There is some overlap in the information in the two data bases.

Herrmann, W. [Sandia National Labs., Albuquerque, NM (United States); von Laven, G.M. [Advanced Software Engineering, Madison, AL (United States); Parker, T. [RE/SPEC, Inc., Albuquerque, NM (United States)

1993-09-01T23:59:59.000Z

474

Using a personal device to strengthen password authentication from an untrusted computer  

E-Print Network (OSTI)

Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user’s long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user’s long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user’s long-term secrets to a client PC only after encrypting the secrets using a pre-installed, “correct” public key of a remote service (the intended recipient of the secrets). The proposed protocol (MP-Auth) realizes such an approach, and is intended to safeguard passwords from keyloggers, other malware (including rootkits), phishing attacks and pharming, as well as to provide transaction security to foil session hijacking. We report on a prototype implementation of MP-Auth, and provide a comparison of web authentication techniques that use an additional factor of authentication (e.g. a cellphone, PDA or hardware token).

Mohammad Mannan; P. C. van Oorschot

2007-01-01T23:59:59.000Z

475

NREL: U.S. Life Cycle Inventory Database - About the LCI Database Project  

NLE Websites -- All DOE Office Websites (Extended Search)

About the LCI Database Project About the LCI Database Project The U.S. Life Cycle Inventory (LCI) Database is a publicly available database that allows users to objectively review and compare analysis results that are based on similar data collection and analysis methods. Finding consistent and transparent LCI data for life cycle assessments (LCAs) is difficult. NREL works with LCA experts to solve this problem by providing a central source of critically reviewed LCI data through its LCI Database Project. NREL's High-Performance Buildings research group is working closely with government stakeholders, and industry partners to develop and maintain the database. The 2009 U.S. Life Cycle Inventory (LCI) Data Stakeholder meeting was an important step in the ongoing improvement of the database. Prior to that event, NREL conducted a poll of current and

476

Sensible Authentication  

Science Conference Proceedings (OSTI)

The problem with securing assets and their functionality is that, by definition, you don't want to protect them from everybody. It makes no sense to protect assets from their owners, or from other authorized individuals (including the trusted personnel ...

Bruce Schneier

2004-02-01T23:59:59.000Z

477

Design and Implementation of the CEBAF Element Database  

Science Conference Proceedings (OSTI)

With inauguration of the CEBAF Element Database (CED) in Fall 2010, Jefferson Lab computer scientists have taken a first step toward the eventual goal of a model-driven accelerator. Once fully populated, the database will be the primary repository of information used for everything from generating lattice decks to booting front-end computers to building controls screens. A particular requirement influencing the CED design is that it must provide consistent access to not only present, but also future, and eventually past, configurations of the CEBAF accelerator. To accomplish this, an introspective database schema was designed that allows new elements, element types, and element properties to be defined on-the-fly without changing table structure. When used in conjunction with the Oracle Workspace Manager, it allows users to seamlessly query data from any time in the database history with the exact same tools as they use for querying the present configuration. Users can also check-out workspaces and use them as staging areas for upcoming machine configurations. All Access to the CED is through a well-documented API that is translated automatically from original C++ into native libraries for script languages such as perl, php, and TCL making access to the CED easy and ubiquitous. Notice: Authored by Jefferson Science Associates, LLC under U.S. DOE Contract No. DE-AC05-06OR23177. The U.S. Government retains a non-exclusive, paid-up, irrevocable, world-wide license to publish or reproduce this manuscript for U.S. Government purposes.

Theodore Larrieu, Christopher Slominski, Michele Joyce

2011-10-01T23:59:59.000Z

478

NETL: News Release - Access to DOE Database of Oil and Natural Gas Research  

NLE Websites -- All DOE Office Websites (Extended Search)

2, 2011 2, 2011 Access to DOE Database of Oil and Natural Gas Research Results Expanded Washington, DC -The results of nearly four decades of research supported by the U.S. Department of Energy (DOE) are now available through the OnePetro online document repository. Click to link to the OnePetro website The OnePetro website now contains NETL's Oil & Gas Knowledge Management Database DOE's Knowledge Management Database (KMD) provides access to content from dozens of CDs and DVDs related to oil and natural gas research that the Office of Fossil Energy's (FE) National Energy Technology Laboratory (NETL) has published over the years. It also provides links to reports, data sets, and project summaries from ongoing research supported by FE's Oil and Natural Gas Program.

479

High Performance Buildings Database | Open Energy Information  

Open Energy Info (EERE)

High Performance Buildings Database High Performance Buildings Database Jump to: navigation, search The High Performance Buildings Database (HPBD), developed by the United States Department of Energy and the National Renewable Energy Laboratory, is "a unique central repository of in-depth information and data on high-performance, green building projects across the United States and abroad."[1] Map of HPBD entries Loading map... {"format":"googlemaps3","type":"ROADMAP","types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"limit":1000,"offset":0,"link":"all","sort":[""],"order":[],"headers":"show","mainlabel":"-","intro":"","outro":"","searchlabel":"\u2026

480

Argonne TTRDC - D3 (Downloadable Dynamometer Database)  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Analysis Transportation Research and Analysis Computing Center Working With Argonne Contact TTRDC Advanced Powertrain Research Facility - Downloadable Dynamometer Database (D3) aprf Advanced Powertrain Research Facility The Downloadable Dynamometer Database (D3) offers publicly available testing data regarding advanced technology vehicles. Derived from independent laboratory testing, the data is intended to enhance the understanding of advanced vehicle technologies for researchers, students, and professionals engaged in energy efficient vehicle research, development and education. Data from this website can only be used with the following attribution: "This data is from the Downloadable Dynamometer Database (http://www.transportation.anl.gov/D3/) and was generated at the Advanced

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

ROW 2.0 - Right-of-Way Environmental Stewardship Bibliographic Database, Version 2.0  

Science Conference Proceedings (OSTI)

The Right-of-Way Environmental Stewardship Bibliographic Database Version 2.0 (ROW 2.0) allows users to search in multiple ways for citations and retrieve summaries of published documents that focus on environmental concerns related to utility corridor design, siting, construction, or management.

2007-03-08T23:59:59.000Z

482

The SQL Server 7.0 Handbook: A Guide to Microsoft Database Computing, 1st edition  

Science Conference Proceedings (OSTI)

From the Publisher:The SQL Server 7.0 Handbook concisely and authoritatively explains how to design, implement, administer, and tune Microsoft's powerful new database management system for Windows NT Readers will learn all major SQL Server 7.0 capabilities ...

Ken England; Nigel Stanley

1999-05-01T23:59:59.000Z

483

HCNet: a database of heart and calcium functional network  

Science Conference Proceedings (OSTI)

Summary: The Heart and Calcium functional Network (HCNet) database is a collection of functional gene modules calculated from the microarray data compendium available from the GEO database. It is a specialized database designed to assist experimentalists ...

Seong-Eui Hong; Seong-Hwan Rho; Young Il Yeom; Do Han Kim

2006-08-01T23:59:59.000Z

484

Fire Protection Database | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fire Protection Database Fire Protection Database Fire Protection Database DOE O 231.1, Environment, Safety, And Health Reporting, requires the submission of an Annual Fire Protection Summary. The previous process used to collect the required data utilizes a Microsoft Access database that was downloaded, completed by the field and then sent to Headquarters for summation and analysis by engineers in Office of Sustainability Support. Data collection for the CY2013 Summary will begin Jan. 1, 2014, and a commitment has been made to the Defense Nuclear Facilities Safety Board to collect this information and make it available utilizing a standard systematic approach. This approach will be accomplished via a web based system which will allow reporting organizations to enter or edit information.

485

IPCC Emission Factor Database | Open Energy Information  

Open Energy Info (EERE)

IPCC Emission Factor Database IPCC Emission Factor Database Jump to: navigation, search Tool Summary Name: IPCC Emission Factor Database Agency/Company /Organization: World Meteorological Organization, United Nations Environment Programme Resource Type: Dataset Website: www.ipcc-nggip.iges.or.jp/EFDB/main.php References: IPCC-EFDB[1] About "EFDB is meant to be a recognised library, where users can find emission factors and other parameters with background documentation or technical references that can be used for estimating greenhouse gas emissions and removals. The responsibility of using this information appropriately will always remain with the users themselves." References ↑ "IPCC-EFDB" Retrieved from "http://en.openei.org/w/index.php?title=IPCC_Emission_Factor_Database&oldid=367213"

486

Buildings Performance Database | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Buildings » Buildings Performance Database Buildings » Buildings Performance Database Buildings Performance Database The Buildings Performance Database (BPD) unlocks the power of building energy performance data. The platform enables users to perform statistical analysis on an anonymous dataset of tens of thousands of commercial and residential buildings from across the country. Users can compare performance trends among similar buildings to identify and prioritize cost-saving energy efficiency improvements and assess the range of likely savings from these improvements. Access BPD Contact Us Key Features The BPD contains actual data on tens of thousands of existing buildings -- not modeled data or anecdotal evidence. The BPD enables statistical analysis without revealing information about individual buildings.

487

Version 2 Global Fire Emissions Database Available  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Fire Emissions Database Available Global Fire Emissions Database Available The ORNL DAAC announces the release of the data set "Global Fire Emissions Database, Version 2 (GFEDv2)." This data set, which supersedes and replaces the Global Fire Emissions Database, Version 1 (GFEDv1), consists of 1 degree x 1 degree gridded monthly burned area, fuel loads, combustion completeness, and fire emissions of carbon (C), carbon dioxide (CO2), carbon monoxide (CO), methane (CH4), non-methane hydrocarbons (NMHC), molecular hydrogen (H2), nitrogen oxides (NOx), nitrous oxide (N2O), particulate matter (PM2.5), total particulate matter (TPM), total carbon (TC), organic carbon (OC), and black carbon (BC) for the time period January 1997 - December 2004. For more information or to access this data set, please see the Vegetation

488

Proposal for a High Energy Nuclear Database  

E-Print Network (OSTI)

Proposal for a High Energy Nuclear Database David A. Brown 1it requires the high-energy nuclear physics com- munity’s ?compilations of high-energy nuclear data for applications

Brown, David A.; Vogt, Ramona

2005-01-01T23:59:59.000Z

489

Probabilistic ranking of database query results  

Science Conference Proceedings (OSTI)

We investigate the problem of ranking answers to a database query when many tuples are returned. We adapt and apply principles of probabilistic models from Information Retrieval for structured data. Our proposed solution is domain independent. It leverages ...

Surajit Chaudhuri; Gautam Das; Vagelis Hristidis; Gerhard Weikum

2004-08-01T23:59:59.000Z

490

Empirical probabilities in monadic deductive databases  

Science Conference Proceedings (OSTI)

We address the problem of supporting empirical probabilities in monadic logic databases. Though the semantics of multivalued logic programs has been studied extensively, the treatment of probabilities as results of statistical findings has not been studied ...

Raymond T. Ng; V. S. Subrahmanian

1992-07-01T23:59:59.000Z

491

NETL's 2007 Coal Power Plant Database  

NLE Websites -- All DOE Office Websites (Extended Search)

05 Access Version Form Flow Access Version An Access-compatible version of the database was created in order to allow quick searches of the substantial amount of data stored in the...

492

Energy Citations Database (ECD) - Alerts Comments  

Office of Scientific and Technical Information (OSTI)

Alerts Comments If you have a question about Energy Citations Database Alerts, we recommend you check frequently asked questions. If your question still has not been answered or if...

493

Inheritance and persistence in database programming languages  

Science Conference Proceedings (OSTI)

In order to represent inheritance, several recent designs for database programming languages have made use of class construct, which can be thought of as a restricted data type with an associated set of instances. Moreover, these classes ...

Peter Buneman; Malcolm Atkinson

1986-06-01T23:59:59.000Z

494

DOE Buildings Performance Database, sample Residential data ...  

Open Energy Info (EERE)

18px" classApple-style-span>The Buildings Performance Database will have an API that allows access to the statistics about the data without exposing private...

495

Energy Citations Database (ECD) - Home Page  

Office of Scientific and Technical Information (OSTI)

SciTech Connect Search SciTech Connect, a consolidation of Information Bridge and Energy Citations Database, incorporating all the R&D info from these two products into one...

496

Technical Staff Council Seminar - Skills Database  

NLE Websites -- All DOE Office Websites (Extended Search)

2003 - 12:00pm Location: Bldg. 90 Seminar HostPoint of Contact: David Faulkner The Technical Staff Council has made a skills database for members of the technical staff to input...

497

User's Guide to VEMAP Phase 2 Database  

NLE Websites -- All DOE Office Websites (Extended Search)

of Temperature and Precipitation database s 6.3.2 Estimation of Solar Radiation and Humidity r 6.4 Climate Variable Descriptions s 6.4.1 Maximum Temperature (tmax) degrees C s...

498

Database Support for Probabilistic Attributes and Tuples  

E-Print Network (OSTI)

Abstract — The inherent uncertainty of data present in numerous applications such as sensor databases, text annotations, and information retrieval motivate the need to handle imprecise data at the database level. Uncertainty can be at the attribute or tuple level and is present in both continuous and discrete data domains. This paper presents a model for handling arbitrary probabilistic uncertain data (both discrete and continuous) natively at the database level. Our approach leads to a natural and efficient representation for probabilistic data. We develop a model that is consistent with possible worlds semantics and closed under basic relational operators. This is the first model that accurately and efficiently handles both continuous and discrete uncertainty. The model is implemented in a real database system (PostgreSQL) and the effectiveness and efficiency of our approach is validated experimentally. I.

Sarvjeet Singh; Chris Mayfield; Rahul Shah; Sunil Prabhakar; Susanne Hambrusch; Jennifer Neville; Reynold Cheng

2008-01-01T23:59:59.000Z

499

Enhanced Substation Equipment Industry-Wide Database  

Science Conference Proceedings (OSTI)

The Electric Power Research Institute (EPRI) Industrywide Equipment Performance Database (IDB) for transformers is a collaborative effort to pool appropriate transformer operating and failure data in order to assemble a statistically valid population of many types of transformers.

2008-12-18T23:59:59.000Z

500

Central Internet Database (CID) Contact Us  

Office of Environmental Management (EM)

Contact Us Central Internet Database CID Photo Banner Contact Us DOE Contact: Doug Tonkay Phone: (301) 903-7212 Email: douglas.tonkay@em.doe.gov Last ReviewedUpdated 3252011...